Miggo Logo

CVE-2022-28730: Apache JSPWiki XSS due to incomplete patch for CVE-2021-40369

6.1

CVSS Score
3.1

Basic Information

EPSS Score
0.97262%
Published
8/5/2022
Updated
1/31/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.apache.jspwiki:jspwiki-mainmaven< 2.11.32.11.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the DenouncePlugin's handling of user-controlled URLs, as explicitly referenced in both CVE descriptions. The AJAXPreview.jsp endpoint is the attack vector, but the root cause is the plugin's rendering logic. The previous CVE-2021-40369 involved similar insufficient sanitization in this plugin, and the advisory confirms the patch was incomplete. While exact code isn't available, the pattern matches classic XSS vulnerabilities in plugin rendering methods that handle untrusted input without proper escaping.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* **r**ully *r**t** r*qu*st on *J*XPr*vi*w.jsp *oul* tri***r *n XSS vuln*r**ility on *p**** JSPWiki, w*i** *oul* *llow t** *tt**k*r to *x**ut* j*v*s*ript in t** vi*tim's *rows*r *n* **t som* s*nsitiv* in*orm*tion **out t** vi*tim. T*is vuln*r**ility

Reasoning

T** vuln*r**ility st*ms *rom t** **noun**Plu*in's **n*lin* o* us*r-*ontroll** URLs, *s *xpli*itly r***r*n*** in *ot* *V* **s*riptions. T** `*J*XPr*vi*w.jsp` *n*point is t** *tt**k v**tor, *ut t** root **us* is t** plu*in's r*n**rin* lo*i*. T** pr*vio