CVE-2022-36094

XWiki Platform Web Parent POM contains Web resources for the XWiki platform, a generic wiki platform. Starting with version 1.0 and prior to versions 13.10.6 and 14.30-rc-1, it's possible to store JavaScript which will be executed by anyone viewing the history of an attachment containing javascript in its name. This issue has been patched in XWiki 13.10.6 and 14.3RC1. As a workaround, it is possible to replace `viewattachrev.vm`, the entry point for this attack, by a patched version from the patch without updating XWiki.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*
cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*

History

14 Sep 2022, 20:30

Type Values Removed Values Added
CWE CWE-80
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.0
CPE cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*
References (CONFIRM) https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-mxf2-4r22-5hq9 - (CONFIRM) https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-mxf2-4r22-5hq9 - Third Party Advisory
References (MISC) https://github.com/xwiki/xwiki-platform/commit/047ce9fa4a7c13f3883438aaf54fc50f287a7e8e - (MISC) https://github.com/xwiki/xwiki-platform/commit/047ce9fa4a7c13f3883438aaf54fc50f287a7e8e - Patch, Third Party Advisory
References (MISC) https://jira.xwiki.org/browse/XWIKI-19612 - (MISC) https://jira.xwiki.org/browse/XWIKI-19612 - Exploit, Vendor Advisory

08 Sep 2022, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-09-08 20:15

Updated : 2024-02-04 22:51


NVD link : CVE-2022-36094

Mitre link : CVE-2022-36094

CVE.ORG link : CVE-2022-36094


JSON object : View

Products Affected

xwiki

  • xwiki
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-80

Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)