// For flags

CVE-2022-29258

Cross-site Scripting in Filter Stream Converter Application in XWiki Platform

Severity Score

6.1
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

XWiki Platform Filter UI provides a generic user interface to convert from a XWiki Filter input stream to an output stream with settings for each stream. Starting with versions 6.0-milestone-2 and 5.4.4 and prior to versions 12.10.11, 14.0-rc-1, 13.4.7, and 13.10.3, XWiki Platform Filter UI contains a possible cross-site scripting vector in the `Filter.FilterStreamDescriptorForm` wiki page related to pretty much all the form fields printed in the home page of the application. The issue is patched in versions 12.10.11, 14.0-rc-1, 13.4.7, and 13.10.3. The easiest workaround is to edit the wiki page `Filter.FilterStreamDescriptorForm` (with wiki editor) according to the instructions in the GitHub Security Advisory.

La interfaz de usuario del filtro de la plataforma XWiki proporciona una interfaz de usuario genérica para convertir de un flujo de entrada del filtro XWiki a un flujo de salida con ajustes para cada flujo. A partir de las versiones 6.0-milestone-2 y 5.4.4 y en versiones anteriores a 12.10.11, 14.0-rc-1, 13.4.7 y 13.10.3, la interfaz de usuario de XWiki Platform Filter contiene un posible vector de tipo cross-site scripting en la página wiki "Filter.FilterStreamDescriptorForm" relacionado con casi todos los campos de formulario impresos en la página de inicio de la aplicación. El problema está parcheado en versiones 12.10.11, 14.0-rc-1, 13.4.7 y 13.10.3. La mitigación más sencilla es editar la página wiki "Filter.FilterStreamDescriptorForm" (con el editor wiki) según las instrucciones del aviso de seguridad de GitHub

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-04-13 CVE Reserved
  • 2022-05-31 CVE Published
  • 2023-12-22 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
  • CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
  • CWE-116: Improper Encoding or Escaping of Output
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Xwiki
Search vendor "Xwiki"
Xwiki
Search vendor "Xwiki" for product "Xwiki"
>= 5.4.4 < 12.10.11
Search vendor "Xwiki" for product "Xwiki" and version " >= 5.4.4 < 12.10.11"
-
Affected
Xwiki
Search vendor "Xwiki"
Xwiki
Search vendor "Xwiki" for product "Xwiki"
>= 13.0 < 13.4.7
Search vendor "Xwiki" for product "Xwiki" and version " >= 13.0 < 13.4.7"
-
Affected
Xwiki
Search vendor "Xwiki"
Xwiki
Search vendor "Xwiki" for product "Xwiki"
>= 13.5 < 13.10.3
Search vendor "Xwiki" for product "Xwiki" and version " >= 13.5 < 13.10.3"
-
Affected