Description
XWiki Platform Web Parent POM contains Web resources for the XWiki platform, a generic wiki platform. Starting with version 1.0 and prior to versions 13.10.6 and 14.30-rc-1, it's possible to store JavaScript which will be executed by anyone viewing the history of an attachment containing javascript in its name. This issue has been patched in XWiki 13.10.6 and 14.3RC1. As a workaround, it is possible to replace `viewattachrev.vm`, the entry point for this attack, by a patched version from the patch without updating XWiki.
Remediation
References
https://github.com/xwiki/xwiki-platform/commit/047ce9fa4a7c13f3883438aaf54fc50f287a7e8e
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-mxf2-4r22-5hq9
https://jira.xwiki.org/browse/XWIKI-19612
Related Vulnerabilities
CVE-2021-32730 Vulnerability in maven package org.xwiki.platform:xwiki-platform-administration-ui
CVE-2015-7559 Vulnerability in maven package org.apache.activemq:activemq-client
CVE-2022-21191 Vulnerability in npm package global-modules-path
CVE-2023-45133 Vulnerability in maven package org.webjars.npm:babel__traverse
CVE-2022-36083 Vulnerability in npm package jose-browser-runtime