CVE-2023-26055

XWiki Commons are technical libraries common to several other top level XWiki projects. Starting in version 3.1-milestone-1, any user can edit their own profile and inject code, which is going to be executed with programming right. The same vulnerability can also be exploited in all other places where short text properties are displayed, e.g., in apps created using Apps Within Minutes that use a short text field. The problem has been patched on versions 13.10.9, 14.4.4, 14.7RC1.
References
Link Resource
https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-8cw6-4r32-6r3h Exploit Vendor Advisory
https://jira.xwiki.org/browse/XCOMMONS-2498 Issue Tracking Patch Vendor Advisory
https://jira.xwiki.org/browse/XWIKI-19793 Exploit Issue Tracking Patch Vendor Advisory
https://jira.xwiki.org/browse/XWIKI-19794 Exploit Issue Tracking Patch Vendor Advisory
https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-8cw6-4r32-6r3h Exploit Vendor Advisory
https://jira.xwiki.org/browse/XCOMMONS-2498 Issue Tracking Patch Vendor Advisory
https://jira.xwiki.org/browse/XWIKI-19793 Exploit Issue Tracking Patch Vendor Advisory
https://jira.xwiki.org/browse/XWIKI-19794 Exploit Issue Tracking Patch Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:xwiki:commons:*:*:*:*:*:*:*:*
cpe:2.3:a:xwiki:commons:*:*:*:*:*:*:*:*
cpe:2.3:a:xwiki:commons:*:*:*:*:*:*:*:*
cpe:2.3:a:xwiki:commons:3.1:milestone1:*:*:*:*:*:*
cpe:2.3:a:xwiki:commons:3.1:milestone2:*:*:*:*:*:*
cpe:2.3:a:xwiki:commons:3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:xwiki:commons:14.4:rc1:*:*:*:*:*:*

History

21 Nov 2024, 07:50

Type Values Removed Values Added
References () https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-8cw6-4r32-6r3h - Exploit, Vendor Advisory () https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-8cw6-4r32-6r3h - Exploit, Vendor Advisory
References () https://jira.xwiki.org/browse/XCOMMONS-2498 - Issue Tracking, Patch, Vendor Advisory () https://jira.xwiki.org/browse/XCOMMONS-2498 - Issue Tracking, Patch, Vendor Advisory
References () https://jira.xwiki.org/browse/XWIKI-19793 - Exploit, Issue Tracking, Patch, Vendor Advisory () https://jira.xwiki.org/browse/XWIKI-19793 - Exploit, Issue Tracking, Patch, Vendor Advisory
References () https://jira.xwiki.org/browse/XWIKI-19794 - Exploit, Issue Tracking, Patch, Vendor Advisory () https://jira.xwiki.org/browse/XWIKI-19794 - Exploit, Issue Tracking, Patch, Vendor Advisory

07 Nov 2023, 04:09

Type Values Removed Values Added
Summary XWiki Commons are technical libraries common to several other top level XWiki projects. Starting in version 3.1-milestone-1, any user can edit their own profile and inject code, which is going to be executed with programming right. The same vulnerability can also be exploited in all other places where short text properties are displayed, e.g., in apps created using Apps Within Minutes that use a short text field. The problem has been patched on versions 13.10.9, 14.4.4, 14.7RC1. XWiki Commons are technical libraries common to several other top level XWiki projects. Starting in version 3.1-milestone-1, any user can edit their own profile and inject code, which is going to be executed with programming right. The same vulnerability can also be exploited in all other places where short text properties are displayed, e.g., in apps created using Apps Within Minutes that use a short text field. The problem has been patched on versions 13.10.9, 14.4.4, 14.7RC1.

Information

Published : 2023-03-02 19:15

Updated : 2024-11-21 07:50


NVD link : CVE-2023-26055

Mitre link : CVE-2023-26055

CVE.ORG link : CVE-2023-26055


JSON object : View

Products Affected

xwiki

  • commons
CWE
CWE-150

Improper Neutralization of Escape, Meta, or Control Sequences

NVD-CWE-Other