First published: Fri Feb 04 2022(Updated: )
### Impact When using default XWiki configuration, it's possible for an attacker to upload an SVG containing a script executed when executing the download action on the file. ### Patches This problem has been patched so that the default configuration doesn't allow to display the SVG files in the browser. ### Workarounds This issue can be fixed without the patch by setting properly the configuration to download or display files, see: https://www.xwiki.org/xwiki/bin/view/Documentation/AdminGuide/Attachments#HAttachmentdisplayordownload ### References https://jira.xwiki.org/browse/XWIKI-18368 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira](http://jira.xwiki.org) * Email us at [security ML](mailto:security@xwiki.org)
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.xwiki.platform:xwiki-platform-tool-configuration-resources | <12.10.6 | 12.10.6 |
maven/org.xwiki.platform:xwiki-platform-tool-configuration-resources | >=13.0<=13.2 | 13.3RC1 |
maven/org.xwiki.platform:xwiki-platform-oldcore | >=13.0<=13.2 | 13.3RC1 |
maven/org.xwiki.platform:xwiki-platform-oldcore | <12.10.6 | 12.10.6 |
Xwiki Xwiki | >=1.0<12.10.6 | |
Xwiki Xwiki | >=13.0<=13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.