mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-07 11:06:19 +00:00
19 lines
1.3 KiB
Markdown
19 lines
1.3 KiB
Markdown
![]() |
### [CVE-2023-35153](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35153)
|
||
|

|
||
|

|
||
|
&color=brighgreen)
|
||
|
&color=brighgreen)
|
||
|
|
||
|
### Description
|
||
|
|
||
|
XWiki Platform is a generic wiki platform. Starting in version 5.4.4 and prior to versions 14.4.8, 14.10.4, and 15.0, a stored cross-site scripting vulnerability can be exploited by users with edit rights by adding a `AppWithinMinutes.FormFieldCategoryClass` class on a page and setting the payload on the page title. Then, any user visiting `/xwiki/bin/view/AppWithinMinutes/ClassEditSheet` executes the payload. The issue has been patched in XWiki 14.4.8, 14.10.4, and 15.0. As a workaround, update `AppWithinMinutes.ClassEditSheet` with a patch.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- https://jira.xwiki.org/browse/XWIKI-20365
|
||
|
|
||
|
#### Github
|
||
|
No PoCs found on GitHub currently.
|
||
|
|