CVE-2022-41928

XWiki Platform vulnerable to Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in AttachmentSelector.xml. The issue can also be reproduced by inserting the dangerous payload in the `height` or `alt` macro properties. This has been patched in versions 13.10.7, 14.4.2, and 14.5. The issue can be fixed on a running wiki by updating `XWiki.AttachmentSelector` with the versions below: - 14.5-rc-1+: https://github.com/xwiki/xwiki-platform/commit/eb15147adf94bddb92626f862c1710d45bcd64a7#diff-e1513599ab698991f6cbba55d38f3f464432ced8d137a668b1f7618c7e747e23 - 14.4.2+: https://github.com/xwiki/xwiki-platform/commit/c02f8eb1f3c953d124f2c097021536f8bc00fa8d#diff-e1513599ab698991f6cbba55d38f3f464432ced8d137a668b1f7618c7e747e23 - 13.10.7+: https://github.com/xwiki/xwiki-platform/commit/efd0df0468d46149ba68b66660b93f31b6318515#diff-e1513599ab698991f6cbba55d38f3f464432ced8d137a668b1f7618c7e747e23
References
Link Resource
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-9hqh-fmhg-vq2j Exploit Patch Third Party Advisory
https://jira.xwiki.org/browse/XWIKI-19800 Exploit Issue Tracking Vendor Advisory
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-9hqh-fmhg-vq2j Exploit Patch Third Party Advisory
https://jira.xwiki.org/browse/XWIKI-19800 Exploit Issue Tracking Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*
cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*
cpe:2.3:a:xwiki:xwiki:5.0:milestone1:*:*:*:*:*:*
cpe:2.3:a:xwiki:xwiki:5.0:milestone2:*:*:*:*:*:*
cpe:2.3:a:xwiki:xwiki:14.4.3:*:*:*:*:*:*:*
cpe:2.3:a:xwiki:xwiki:14.4.4:*:*:*:*:*:*:*

History

21 Nov 2024, 07:24

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 8.8
v2 : unknown
v3 : 9.9
References () https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-9hqh-fmhg-vq2j - Exploit, Patch, Third Party Advisory () https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-9hqh-fmhg-vq2j - Exploit, Patch, Third Party Advisory
References () https://jira.xwiki.org/browse/XWIKI-19800 - Exploit, Issue Tracking, Vendor Advisory () https://jira.xwiki.org/browse/XWIKI-19800 - Exploit, Issue Tracking, Vendor Advisory

Information

Published : 2022-11-23 19:15

Updated : 2024-11-21 07:24


NVD link : CVE-2022-41928

Mitre link : CVE-2022-41928

CVE.ORG link : CVE-2022-41928


JSON object : View

Products Affected

xwiki

  • xwiki
CWE
CWE-95

Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')