CVE-2023-46732
Reflected Cross-site scripting through revision parameter in content menu in XWiki Platform
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. XWiki is vulnerable to reflected cross-site scripting (RXSS) via the `rev` parameter that is used in the content of the content menu without escaping. If an attacker can convince a user to visit a link with a crafted parameter, this allows the attacker to execute arbitrary actions in the name of the user, including remote code (Groovy) execution in the case of a user with programming right, compromising the confidentiality, integrity and availability of the whole XWiki installation. This has been patched in XWiki 15.6 RC1, 15.5.1 and 14.10.14. The patch in commit `04e325d57` can be manually applied without upgrading (or restarting) the instance. Users are advised to upgrade or to manually apply the patch. There are no known workarounds for this vulnerability.
XWiki Platform es una plataforma wiki genérica que ofrece servicios de ejecución para aplicaciones creadas sobre ella. XWiki es vulnerable a Reflected Cross-Site Scripting (RXSS) a través del parámetro "rev" que se utiliza en el contenido del menú de contenido sin escapar. Si un atacante puede convencer a un usuario para que visite un enlace con un parámetro manipulado, esto le permitirá ejecutar acciones arbitrarias en nombre del usuario, incluida la ejecución remota de código (Groovy) en el caso de un usuario con derechos de programación, comprometiendo la confidencialidad, integridad y disponibilidad de toda la instalación de XWiki. Esto ha sido parcheado en XWiki 15.6 RC1, 15.5.1 y 14.10.14. El parche en el commit `04e325d57` se puede aplicar manualmente sin actualizar (o reiniciar) la instancia. Se recomienda a los usuarios que actualicen o apliquen manualmente el parche. No se conocen workarounds para esta vulnerabilidad.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2023-10-25 CVE Reserved
- 2023-11-06 CVE Published
- 2024-09-05 CVE Updated
- 2024-09-05 First Exploit
- 2024-11-12 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (3)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-j9rc-w3wv-fv62 | 2024-09-05 |
URL | Date | SRC |
---|---|---|
https://github.com/xwiki/xwiki-platform/commit/04e325d57d4bcb6ab79bddcafbb19032474c2a55 | 2023-11-14 |
URL | Date | SRC |
---|---|---|
https://jira.xwiki.org/browse/XWIKI-21095 | 2023-11-14 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Xwiki Search vendor "Xwiki" | Xwiki Search vendor "Xwiki" for product "Xwiki" | >= 9.7 < 14.10.14 Search vendor "Xwiki" for product "Xwiki" and version " >= 9.7 < 14.10.14" | - |
Affected
| ||||||
Xwiki Search vendor "Xwiki" | Xwiki Search vendor "Xwiki" for product "Xwiki" | >= 15.0 < 15.5.1 Search vendor "Xwiki" for product "Xwiki" and version " >= 15.0 < 15.5.1" | - |
Affected
|