Description
XWiki Platform Web Parent POM contains Web resources for the XWiki platform, a generic wiki platform. Starting with version 1.0 and prior to versions 13.10.6 and 14.30-rc-1, it's possible to store JavaScript which will be executed by anyone viewing the history of an attachment containing javascript in its name. This issue has been patched in XWiki 13.10.6 and 14.3RC1. As a workaround, it is possible to replace `viewattachrev.vm`, the entry point for this attack, by a patched version from the patch without updating XWiki.
Remediation
References
https://github.com/xwiki/xwiki-platform/commit/047ce9fa4a7c13f3883438aaf54fc50f287a7e8e
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-mxf2-4r22-5hq9
https://jira.xwiki.org/browse/XWIKI-19612
Related Vulnerabilities
CVE-2022-36904 Vulnerability in maven package org.jenkins-ci.plugins:repository-connector
CVE-2023-24998 Vulnerability in maven package commons-fileupload:commons-fileupload
CVE-2012-0818 Vulnerability in maven package org.jboss.resteasy:resteasy-jaxrs
CVE-2022-24785 Vulnerability in maven package org.fujion.webjars:moment