Description
XWiki Platform Web Parent POM contains Web resources for the XWiki platform, a generic wiki platform. Starting with version 1.0 and prior to versions 13.10.6 and 14.30-rc-1, it's possible to store JavaScript which will be executed by anyone viewing the history of an attachment containing javascript in its name. This issue has been patched in XWiki 13.10.6 and 14.3RC1. As a workaround, it is possible to replace `viewattachrev.vm`, the entry point for this attack, by a patched version from the patch without updating XWiki.
Remediation
References
https://github.com/xwiki/xwiki-platform/commit/047ce9fa4a7c13f3883438aaf54fc50f287a7e8e
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-mxf2-4r22-5hq9
https://jira.xwiki.org/browse/XWIKI-19612
Related Vulnerabilities
CVE-2022-36437 Vulnerability in maven package com.hazelcast.jet:hazelcast-jet-enterprise
CVE-2021-3827 Vulnerability in maven package org.keycloak:keycloak-saml-core
CVE-2019-25155 Vulnerability in maven package org.webjars.bowergithub.cure53:dompurify
CVE-2021-3794 Vulnerability in npm package @vuelidate/validators