// For flags

CVE-2022-36094

XWiki Platform Web Parent POM vulnerable to XSS in the attachment history

Severity Score

9.0
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

XWiki Platform Web Parent POM contains Web resources for the XWiki platform, a generic wiki platform. Starting with version 1.0 and prior to versions 13.10.6 and 14.30-rc-1, it's possible to store JavaScript which will be executed by anyone viewing the history of an attachment containing javascript in its name. This issue has been patched in XWiki 13.10.6 and 14.3RC1. As a workaround, it is possible to replace `viewattachrev.vm`, the entry point for this attack, by a patched version from the patch without updating XWiki.

XWiki Platform Web Parent POM contiene recursos web para la plataforma XWiki, una plataforma wiki genérica. A partir de la versión 1.0 y en versiones anteriores a 13.10.6 y 14.30-rc-1, es posible almacenar JavaScript que ejecutará cualquiera que visualice el historial de un archivo adjunto que contenga javascript en su nombre. Este problema ha sido parcheado en XWiki versiones 13.10.6 y 14.3RC1. Como mitigación, es posible reemplazar "viewattachrev.vm", el punto de entrada de este ataque, por una versión parcheada del parche sin actualizar XWiki

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
Low
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-07-15 CVE Reserved
  • 2022-09-08 CVE Published
  • 2024-04-29 EPSS Updated
  • 2024-08-03 CVE Updated
  • 2024-08-03 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
  • CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Xwiki
Search vendor "Xwiki"
Xwiki
Search vendor "Xwiki" for product "Xwiki"
>= 1.0 < 13.10.6
Search vendor "Xwiki" for product "Xwiki" and version " >= 1.0 < 13.10.6"
-
Affected
Xwiki
Search vendor "Xwiki"
Xwiki
Search vendor "Xwiki" for product "Xwiki"
>= 14.0 < 14.3
Search vendor "Xwiki" for product "Xwiki" and version " >= 14.0 < 14.3"
-
Affected