It's possible to store a JavaScript which will be executed by anyone viewing the history of an attachment containing javascript in its name.
For example, attachment a file with name ><img src=1 onerror=alert(1)>.jpg will execute the alert.
This issue has been patched in XWiki 13.10.6 and 14.3RC1.
It is possible to replace viewattachrev.vm, the entry point for this attack, by a patched version from the patch without updating XWiki.
If you have any questions or comments about this advisory: * Open an issue in Jira XWiki.org * Email us at Security Mailing List
{
"nvd_published_at": "2022-09-08T20:15:00Z",
"github_reviewed": true,
"cwe_ids": [
"CWE-79",
"CWE-80"
],
"github_reviewed_at": "2022-09-16T17:05:12Z",
"severity": "HIGH"
}