XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. It is possible to persistently inject scripts in XWiki versions prior to 12.6.3 and 12.8. Unregistred users can fill simple text fields. Registered users can fill in their personal information and (if they have edit rights) fill the values of static lists using App Within Minutes. There is no easy workaround except upgrading XWiki. The vulnerability has been patched on XWiki 12.8 and 12.6.3.
References
Link | Resource |
---|---|
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-5c66-v29h-xjh8 | Exploit Third Party Advisory |
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-5c66-v29h-xjh8 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:01
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 9.6 |
References | () https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-5c66-v29h-xjh8 - Exploit, Third Party Advisory |
Information
Published : 2021-04-20 19:15
Updated : 2024-11-21 06:01
NVD link : CVE-2021-29459
Mitre link : CVE-2021-29459
CVE.ORG link : CVE-2021-29459
JSON object : View
Products Affected
xwiki
- xwiki
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')