Description
XWiki Platform Web Parent POM contains Web resources for the XWiki platform, a generic wiki platform. Starting with version 1.0 and prior to versions 13.10.6 and 14.30-rc-1, it's possible to store JavaScript which will be executed by anyone viewing the history of an attachment containing javascript in its name. This issue has been patched in XWiki 13.10.6 and 14.3RC1. As a workaround, it is possible to replace `viewattachrev.vm`, the entry point for this attack, by a patched version from the patch without updating XWiki.
Remediation
References
https://github.com/xwiki/xwiki-platform/commit/047ce9fa4a7c13f3883438aaf54fc50f287a7e8e
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-mxf2-4r22-5hq9
https://jira.xwiki.org/browse/XWIKI-19612
Related Vulnerabilities
CVE-2013-6372 Vulnerability in maven package org.jenkins-ci.plugins:subversion
CVE-2021-40822 Vulnerability in maven package org.geoserver:gs-main
CVE-2022-24999 Vulnerability in maven package org.webjars:qs
CVE-2023-32695 Vulnerability in maven package org.webjars.npm:socket.io-parser
CVE-2021-31805 Vulnerability in maven package org.apache.struts:struts2-core