Page 20 of 104 results (0.013 seconds)

CVSS: 9.0EPSS: 1%CPEs: 2EXPL: 1

In XWiki before version 12.5 and 11.10.6, any user with SCRIPT right (EDIT right before XWiki 7.4) can gain access to the application server Servlet context which contains tools allowing to instantiate arbitrary Java objects and invoke methods that may lead to arbitrary code execution. This is patched in XWiki 12.5 and XWiki 11.10.6. En XWiki versiones anteriores a 2.5 y 11.10.6, cualquier usuario con derecho de SCRIPT (EDITA justo antes de XWiki versión 7.4) puede obtener acceso al contexto de Servlet del servidor de aplicaciones que contiene herramientas que permiten crear instancias de objetos Java arbitrarios e invocar métodos que pueden conllevar a una ejecución de código arbitraria. Esto está parcheado en XWiki versión 12.5 y XWiki versión 11.10.6 • https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-5hv6-mh8q-q9v8 https://jira.xwiki.org/browse/XWIKI-17141 https://jira.xwiki.org/browse/XWIKI-17423 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 6.6EPSS: 0%CPEs: 2EXPL: 0

In XWiki before versions 11.10.5 or 12.2.1, any user with SCRIPT right (EDIT right before XWiki 7.4) can gain access to the application server Servlet context which contains tools allowing to instantiate arbitrary Java objects and invoke methods that may lead to arbitrary code execution. The only workaround is to give SCRIPT right only to trusted users. En XWiki versiones anteriores a 11.10.5 o 12.2.1, cualquier usuario con derecho de SCRIPT (derecho EDIT anterior a XWiki 7.4), puede obtener acceso al contexto del Servlet del servidor de aplicaciones, que contiene herramientas que permiten crear instancias de objetos Java arbitrarios e invocar métodos que pueden conducir a una ejecución de código. La única solución alternativa es otorgar el derecho de SCRIPT solo a los usuarios de confianza • https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-7qw5-pqhc-xm4g • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 1

The Image Import function in XWiki through 10.7 has XSS. La función Image Import en XWiki hasta la versión 10.7 tiene Cross-Site Scripting (XSS). • https://mksec.tk/index.php/2018/09/27/cve-2018-16277-xss-in-xwiki • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 0%CPEs: 9EXPL: 0

SQL injection vulnerability in XWiki Enterprise before 2.5 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. Vulnerabilidad de inyección SQL en XWiki Enterprise en versiones anteriores a la 2.5. Permite a atacantes remotos ejecutar comandos SQL de su elección a través de vectores sin especificar. • http://secunia.com/advisories/42058 http://www.osvdb.org/68976 http://www.securityfocus.com/bid/44601 http://www.xwiki.org/xwiki/bin/view/ReleaseNotes/ReleaseNotesXWikiEnterprise25 https://exchange.xforce.ibmcloud.com/vulnerabilities/62943 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 4.3EPSS: 0%CPEs: 9EXPL: 0

Cross-site scripting (XSS) vulnerability in XWiki Enterprise before 2.5 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en XWiki Enterprise en versiones anteriores a la 2.5. Permite a usuarios remotos inyectar codigo de script web o código HTML de su elección a través de vectores sin especificar. • http://secunia.com/advisories/42058 http://www.osvdb.org/68977 http://www.securityfocus.com/bid/44601 http://www.xwiki.org/xwiki/bin/view/ReleaseNotes/ReleaseNotesXWikiEnterprise25 https://exchange.xforce.ibmcloud.com/vulnerabilities/62942 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •