Description
XWiki Platform Web Parent POM contains Web resources for the XWiki platform, a generic wiki platform. Starting with version 1.0 and prior to versions 13.10.6 and 14.30-rc-1, it's possible to store JavaScript which will be executed by anyone viewing the history of an attachment containing javascript in its name. This issue has been patched in XWiki 13.10.6 and 14.3RC1. As a workaround, it is possible to replace `viewattachrev.vm`, the entry point for this attack, by a patched version from the patch without updating XWiki.
Remediation
References
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-mxf2-4r22-5hq9
https://github.com/xwiki/xwiki-platform/commit/047ce9fa4a7c13f3883438aaf54fc50f287a7e8e
https://jira.xwiki.org/browse/XWIKI-19612
Related Vulnerabilities
CVE-2022-21704 Vulnerability in npm package log4js
CVE-2020-28490 Vulnerability in npm package async-git
CVE-2016-10604 Vulnerability in npm package dalek-browser-chrome
CVE-2022-45685 Vulnerability in maven package org.codehaus.jettison:jettison
CVE-2021-23771 Vulnerability in npm package argencoders-notevil