GHSA-9jq9-c2cv-pcrj
GitHub Security Advisory
Cross-site Scripting by SVG upload in xwiki-platform
Advisory Details
### Impact
When using default XWiki configuration, it's possible for an attacker to upload an SVG containing a script executed when executing the download action on the file.
### Patches
This problem has been patched so that the default configuration doesn't allow to display the SVG files in the browser.
### Workarounds
This issue can be fixed without the patch by setting properly the configuration to download or display files, see: https://www.xwiki.org/xwiki/bin/view/Documentation/AdminGuide/Attachments#HAttachmentdisplayordownload
### References
https://jira.xwiki.org/browse/XWIKI-18368
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira](http://jira.xwiki.org)
* Email us at [security ML](mailto:[email protected])
Affected Packages
Related CVEs
Key Information
Dataset
Data from GitHub Advisory Database. This information is provided for research and educational purposes.