XWiki Commons are technical libraries common to several other top level XWiki projects. The HTML macro does not systematically perform a proper neutralization of script-related html tags. As a result, any user able to use the html macro in XWiki, is able to introduce an XSS attack. This can be particularly dangerous since in a standard wiki, any user is able to use the html macro directly in their own user profile page. The problem has been patched in XWiki 14.8RC1. The patch involves the HTML macros and are systematically cleaned up whenever the user does not have the script correct.
References
Link | Resource |
---|---|
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-vxf7-mx22-jr24 | Exploit Patch Vendor Advisory |
https://jira.xwiki.org/browse/XWIKI-18568 | Exploit Issue Tracking |
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-vxf7-mx22-jr24 | Exploit Patch Vendor Advisory |
https://jira.xwiki.org/browse/XWIKI-18568 | Exploit Issue Tracking |
Configurations
History
21 Nov 2024, 07:56
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-vxf7-mx22-jr24 - Exploit, Patch, Vendor Advisory | |
References | () https://jira.xwiki.org/browse/XWIKI-18568 - Exploit, Issue Tracking | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.9 |
Information
Published : 2023-04-15 16:15
Updated : 2024-11-21 07:56
NVD link : CVE-2023-29205
Mitre link : CVE-2023-29205
CVE.ORG link : CVE-2023-29205
JSON object : View
Products Affected
xwiki
- xwiki
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')