Miggo Logo

CVE-2022-36094: XWiki Platform Web Parent POM vulnerable to XSS in the attachment history

8.9

CVSS Score
3.1

Basic Information

EPSS Score
0.97636%
Published
9/16/2022
Updated
1/27/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.xwiki.platform:xwiki-platform-webmaven>= 1.0, < 13.10.613.10.6
org.xwiki.platform:xwiki-platform-webmaven>= 14.0, < 14.3-rc-114.3-rc-1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from missing HTML escaping in two locations in viewattachrev.vm: 1) In the page title localization string interpolation, and 2) In the <img> alt attribute. The commit patch adds $escapetool.xml() to sanitize the filename input. As Velocity templates control HTML generation, unescaped user-controlled input (attachment filenames) in these template variables directly enables XSS. The CWE mapping (CWE-79/CWE-80) and attack example confirm this is an output encoding failure in template rendering.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t It's possi*l* to stor* * J*v*S*ript w*i** will ** *x**ut** *y *nyon* vi*win* t** *istory o* *n *tt***m*nt *ont*inin* j*v*s*ript in its n*m*. *or *x*mpl*, *tt***m*nt * *il* wit* n*m* `><im* sr*=* on*rror=*l*rt(*)>.jp*` will *x**ut* t** *l

Reasoning

T** vuln*r**ility st*ms *rom missin* *TML *s**pin* in two lo**tions in vi*w*tt***r*v.vm: *) In t** p*** titl* lo**liz*tion strin* int*rpol*tion, *n* *) In t** <im*> *lt *ttri*ut*. T** *ommit p*t** ***s $*s**p*tool.xml() to s*nitiz* t** *il*n*m* input