Uploaded image for project: 'XWiki Platform'
  1. XWiki Platform
  2. XWIKI-19671

Stored XSS via the RSS macro

    XMLWordPrintable

Details

    • Unit
    • High
    • Unknown
    • N/A
    • N/A

    Description

      The RSS macro (enabled by default) allows to inject arbitrary HTML code including JavaScript into the output.

      Steps to reproduce:

      1. Edit the user profile
      2. Click on the "+" icon, select "Other Macros", type "RSS" and select the RSS Macro
      3. Enter https://xssrss.blogspot.com/feeds/posts/default?alt=rss as feed URL and check the "Content" checkbox. In XWiki syntax (2.0), the syntax is:
        {{rss feed="https://xssrss.blogspot.com/feeds/posts/default?alt=rss" content="true" /}}
        
      1. Click "Submit" to insert the macro
      2. Click "Save and view"

      Expected result:

      No scripts are executed.

      Actual result:

      An alert with content "1" is displayed.

      This issue is caused by XWIKI-3344 and thus reproducible since XWiki 1.8 (when using XWiki syntax 2.0, which is available but not default). Note that until XWIKI-4096 (XWiki 2.0 M2) the content has been wrapped in a HTML macro instead of a raw block but this doesn't prevent the attack.

      Attachments

        Issue Links

          Activity

            People

              MichaelHamann Michael Hamann
              MichaelHamann Michael Hamann
              Votes:
              0 Vote for this issue
              Watchers:
              1 Start watching this issue

              Dates

                Created:
                Updated:
                Resolved: