First published: Thu Sep 08 2022(Updated: )
XWiki Platform Attachment UI provides a macro to easily upload and select attachments for XWiki Platform, a generic wiki platform. Starting with version 14.0-rc-1 and prior to 14.4-rc-1, it's possible to store JavaScript in an attachment name, which will be executed by anyone trying to move the corresponding attachment. This issue has been patched in XWiki 14.4-rc-1. As a workaround, one may copy `moveStep1.vm` to `webapp/xwiki/templates/moveStep1.vm` and replace vulnerable code with code from the patch.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xwiki | >=14.0<14.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-36097 has been rated as a high severity vulnerability due to the possibility of executing malicious JavaScript code.
To fix CVE-2022-36097, upgrade to XWiki Platform version 14.4-rc-1 or later.
CVE-2022-36097 affects XWiki Platform versions from 14.0-rc-1 to 14.3.
The implications of CVE-2022-36097 include potential unauthorized JavaScript execution, leading to security breaches.
Currently, there is no documented workaround for CVE-2022-36097 other than upgrading to a fixed version.