Details
-
Bug
-
Resolution: Fixed
-
Critical
-
7.0-milestone-2
-
stable-postgres-tomcat Docker image
-
Unit
-
Unknown
-
N/A
-
N/A
-
Description
The /bin/distribution/XWiki/Distribution endpoint was found to be vulnerable to reflected XSS via the extensionId and extensionVersion query parameters. When attacker-supplied values are provided in these parameters, they are reflected unescaped into the resulting error message. As a result, arbitrary JavaScript is executed in the browser of any user who follows a crafted link to this endpoint.
Because the payload is executed when the error message is rendered, this vulnerability can be exploited without requiring the user to upload content or otherwise interact beyond clicking a malicious link.
Attachments
Issue Links
- is related to
-
XWIKI-23096 Reflected XSS vulnerability in extension and job_status_json templates
-
- Closed
-
- links to