GHSA-mxf2-4r22-5hq9
GitHub Security Advisory
XWiki Platform Web Parent POM vulnerable to XSS in the attachment history
Advisory Details
### Impact
It's possible to store a JavaScript which will be executed by anyone viewing the history of an attachment containing javascript in its name.
For example, attachment a file with name `><img src=1 onerror=alert(1)>.jpg` will execute the alert.
### Patches
This issue has been patched in XWiki 13.10.6 and 14.3RC1.
### Workarounds
It is possible to replace viewattachrev.vm, the entry point for this attack, by a [patch](https://github.com/xwiki/xwiki-platform/commit/047ce9fa4a7c13f3883438aaf54fc50f287a7e8e)ed version from the patch without updating XWiki.
### References
* https://jira.xwiki.org/browse/XWIKI-19612
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)
* Email us at [Security Mailing List](mailto:[email protected])
Affected Packages
Related CVEs
Key Information
Dataset
Data from GitHub Advisory Database. This information is provided for research and educational purposes.