XWiki Commons are technical libraries common to several other top level XWiki projects. The Livetable Macro wasn't properly sanitizing column names, thus allowing the insertion of raw HTML code including JavaScript. This vulnerability was also exploitable via the Documents Macro that is included since XWiki 3.5M1 and doesn't require script rights, this can be demonstrated with the syntax `{{documents id="example" count="5" actions="false" columns="doc.title, before<script>alert(1)</script>after"/}}`. Therefore, this can also be exploited by users without script right and in comments. With the interaction of a user with more rights, this could be used to execute arbitrary actions in the wiki, including privilege escalation, remote code execution, information disclosure, modifying or deleting content. This has been patched in XWiki 14.9, 14.4.6, and 13.10.10.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/xwiki/xwiki-platform/commit/65ca06c51e7a1d5a579344c7272b2cc9a9a21126 | Patch | 
| https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-6vgh-9r3c-2cxp | Exploit Patch Vendor Advisory | 
| https://jira.xwiki.org/browse/XWIKI-15205 | Exploit Issue Tracking | 
| https://github.com/xwiki/xwiki-platform/commit/65ca06c51e7a1d5a579344c7272b2cc9a9a21126 | Patch | 
| https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-6vgh-9r3c-2cxp | Exploit Patch Vendor Advisory | 
| https://jira.xwiki.org/browse/XWIKI-15205 | Exploit Issue Tracking | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 07:56
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : unknown v3 : 8.9 | 
| References | () https://github.com/xwiki/xwiki-platform/commit/65ca06c51e7a1d5a579344c7272b2cc9a9a21126 - Patch | |
| References | () https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-6vgh-9r3c-2cxp - Exploit, Patch, Vendor Advisory | |
| References | () https://jira.xwiki.org/browse/XWIKI-15205 - Exploit, Issue Tracking | 
26 Apr 2023, 19:29
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : unknown v3 : 9.0 | 
| CPE | cpe:2.3:a:xwiki:xwiki:1.9:milestone2:*:*:*:*:*:* cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:* | |
| First Time | Xwiki xwiki Xwiki | |
| References | (MISC) https://github.com/xwiki/xwiki-platform/commit/65ca06c51e7a1d5a579344c7272b2cc9a9a21126 - Patch | |
| References | (MISC) https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-6vgh-9r3c-2cxp - Exploit, Patch, Vendor Advisory | |
| References | (MISC) https://jira.xwiki.org/browse/XWIKI-15205 - Exploit, Issue Tracking | 
15 Apr 2023, 16:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2023-04-15 16:15
Updated : 2024-11-21 07:56
NVD link : CVE-2023-29207
Mitre link : CVE-2023-29207
CVE.ORG link : CVE-2023-29207
JSON object : View
Products Affected
                xwiki
- xwiki
CWE
                
                    
                        
                        CWE-79
                        
            Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
