Miggo Logo

CVE-2023-45134: XWiki Platform XSS vulnerability from account in the create page form via template provider

9.1

CVSS Score
3.1

Basic Information

EPSS Score
0.89009%
Published
10/25/2023
Updated
11/3/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.xwiki.platform:xwiki-platform-web-templatesmaven< 14.10.1214.10.12
org.xwiki.platform:xwiki-platform-web-templatesmaven>= 15.0-rc-1, < 15.5-rc-115.5-rc-1
org.xwiki.platform:xwiki-web-standardmaven>= 2.4-milestone-2, < 3.1-milestone-13.1-milestone-1
org.xwiki.platform:xwiki-platform-webmaven>= 3.1-milestone-1, < 13.4-rc-113.4-rc-1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from unescaped Velocity template outputs in createinline.vm. The commit diff shows the addition of $escapetool.xml() wrappers around services.localization.render() calls that previously output attacker-controlled values like $templateProvider and $allowedSpaces.toString(). These values were derived from user-configured template providers and could contain XSS payloads. The lack of escaping in the original implementation allowed HTML/JS injection when rendering error messages during document creation.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t *n *tt**k*r **n *r**t* * t*mpl*t* provi**r on *ny *o*um*nt t**t is p*rt o* t** wiki (*oul* ** t** *tt**k*r's us*r pro*il*) t**t *ont*ins m*li*ious *o**. T*is *o** is *x**ut** w**n t*is t*mpl*t* provi**r is s*l**t** *urin* *o*um*nt *r**tion

Reasoning

T** vuln*r**ility st*ms *rom un*s**p** V*lo*ity t*mpl*t* outputs in `*r**t*inlin*.vm`. T** *ommit *i** s*ows t** ***ition o* `$*s**p*tool.xml()` wr*pp*rs *roun* `s*rvi**s.lo**liz*tion.r*n**r()` **lls t**t pr*viously output *tt**k*r-*ontroll** v*lu*s