XWiki Commons are technical libraries common to several other top level XWiki projects. Starting in version 3.1-milestone-1, any user can edit their own profile and inject code, which is going to be executed with programming right. The same vulnerability can also be exploited in all other places where short text properties are displayed, e.g., in apps created using Apps Within Minutes that use a short text field. The problem has been patched on versions 13.10.9, 14.4.4, 14.7RC1.
References
Link | Resource |
---|---|
https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-8cw6-4r32-6r3h | Exploit Vendor Advisory |
https://jira.xwiki.org/browse/XCOMMONS-2498 | Issue Tracking Patch Vendor Advisory |
https://jira.xwiki.org/browse/XWIKI-19793 | Exploit Issue Tracking Patch Vendor Advisory |
https://jira.xwiki.org/browse/XWIKI-19794 | Exploit Issue Tracking Patch Vendor Advisory |
https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-8cw6-4r32-6r3h | Exploit Vendor Advisory |
https://jira.xwiki.org/browse/XCOMMONS-2498 | Issue Tracking Patch Vendor Advisory |
https://jira.xwiki.org/browse/XWIKI-19793 | Exploit Issue Tracking Patch Vendor Advisory |
https://jira.xwiki.org/browse/XWIKI-19794 | Exploit Issue Tracking Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:50
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-8cw6-4r32-6r3h - Exploit, Vendor Advisory | |
References | () https://jira.xwiki.org/browse/XCOMMONS-2498 - Issue Tracking, Patch, Vendor Advisory | |
References | () https://jira.xwiki.org/browse/XWIKI-19793 - Exploit, Issue Tracking, Patch, Vendor Advisory | |
References | () https://jira.xwiki.org/browse/XWIKI-19794 - Exploit, Issue Tracking, Patch, Vendor Advisory |
07 Nov 2023, 04:09
Type | Values Removed | Values Added |
---|---|---|
Summary | XWiki Commons are technical libraries common to several other top level XWiki projects. Starting in version 3.1-milestone-1, any user can edit their own profile and inject code, which is going to be executed with programming right. The same vulnerability can also be exploited in all other places where short text properties are displayed, e.g., in apps created using Apps Within Minutes that use a short text field. The problem has been patched on versions 13.10.9, 14.4.4, 14.7RC1. |
Information
Published : 2023-03-02 19:15
Updated : 2024-11-21 07:50
NVD link : CVE-2023-26055
Mitre link : CVE-2023-26055
CVE.ORG link : CVE-2023-26055
JSON object : View
Products Affected
xwiki
- commons
CWE