XWiki Platform is a generic wiki platform. Starting in version 5.4.4 and prior to versions 14.4.8, 14.10.4, and 15.0, a stored cross-site scripting vulnerability can be exploited by users with edit rights by adding a `AppWithinMinutes.FormFieldCategoryClass` class on a page and setting the payload on the page title. Then, any user visiting `/xwiki/bin/view/AppWithinMinutes/ClassEditSheet` executes the payload. The issue has been patched in XWiki 14.4.8, 14.10.4, and 15.0. As a workaround, update `AppWithinMinutes.ClassEditSheet` with a patch.
References
Link | Resource |
---|---|
https://github.com/xwiki/xwiki-platform/commit/1b87fec1e5b5ec00b7a8c3c3f94f6c5e22547392#diff-79e725ec7125cced7d302e1a1f955a76745af26ef28a148981b810e85335d302 | Patch Vendor Advisory |
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-4wc6-hqv9-qc97 | Vendor Advisory |
https://jira.xwiki.org/browse/XWIKI-20365 | Exploit Issue Tracking Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
30 Jun 2023, 13:09
Type | Values Removed | Values Added |
---|---|---|
First Time |
Xwiki
Xwiki xwiki |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
CWE | ||
CPE | cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:* cpe:2.3:a:xwiki:xwiki:15.0:rc1:*:*:*:*:*:* |
|
References | (MISC) https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-4wc6-hqv9-qc97 - Vendor Advisory | |
References | (MISC) https://github.com/xwiki/xwiki-platform/commit/1b87fec1e5b5ec00b7a8c3c3f94f6c5e22547392#diff-79e725ec7125cced7d302e1a1f955a76745af26ef28a148981b810e85335d302 - Patch, Vendor Advisory | |
References | (MISC) https://jira.xwiki.org/browse/XWIKI-20365 - Exploit, Issue Tracking, Patch, Vendor Advisory |
23 Jun 2023, 19:24
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-06-23 18:15
Updated : 2024-02-28 20:13
NVD link : CVE-2023-35153
Mitre link : CVE-2023-35153
CVE.ORG link : CVE-2023-35153
JSON object : View
Products Affected
xwiki
- xwiki