Details
-
Bug
-
Resolution: Duplicate
-
Major
-
None
-
4.2-milestone-2
-
Unknown
-
Description
While passing parameters to images or links, one can also pass the javascript on*(error/click/etc.) parameters allowing the execution of arbitrary JS code.
Examples:
- [[image:1.jpg||onerror="javascript:alert(0)"]]
- [[label>>WebHome||onclick="javascript:alert(0)"]]
These parameters should be excluded from rendering.
As reported by http://www.exploit-db.com/exploits/20856/
Attachments
Issue Links
- duplicates
-
XRENDERING-663 XSS Javascript injection via XWiki 2.x syntax
- Closed
- is duplicated by
-
XRENDERING-454 XSS vulnerabilities in XWiki syntax
- Closed
-
XWIKI-15545 XSS in Import Image
- Closed