CVE-2024-41947: XWiki Platform vulnerable to Cross-Site Scripting (XSS) through conflict resolution
By creating a conflict when another user with more rights is currently editing a page, it is possible to execute JavaScript snippets on the side of the other user, which compromises the confidentiality, integrity and availability of the whole XWiki installation.
To reproduce on a XWiki instance, a user with admin rights needs to edit a document without saving right away.
Then, as another user without any other right than edit on the specific document, change the whole content to <script>alert('XSS')</script>
.
When the admin user then saves the document, a conflict popup appears. If they select “Fix each conflict individually” and see an alert displaying “XSS”, then the instance is vulnerable.
References
- github.com/advisories/GHSA-692v-783f-mg8x
- github.com/xwiki/xwiki-platform
- github.com/xwiki/xwiki-platform/commit/821d43ec45e67d45a6735a0717b9b77fffc1cd9f
- github.com/xwiki/xwiki-platform/commit/e00e159d3737397eebd1f6ff925c1f5cb7cdec34
- github.com/xwiki/xwiki-platform/security/advisories/GHSA-692v-783f-mg8x
- jira.xwiki.org/browse/XWIKI-21626
- nvd.nist.gov/vuln/detail/CVE-2024-41947
Detect and mitigate CVE-2024-41947 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →