XWiki is a generic wiki platform offering runtime services for applications built on top of it. When using default XWiki configuration, it's possible for an attacker to upload an SVG containing a script executed when executing the download action on the file. This problem has been patched so that the default configuration doesn't allow to display the SVG files in the browser. Users are advised to update or to disallow uploads of SVG files.
References
Link | Resource |
---|---|
https://github.com/xwiki/xwiki-platform/commit/5853d492b3a274db0d94d560e2a5ea988a271c62 | Patch Third Party Advisory |
https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-9jq9-c2cv-pcrj | Third Party Advisory |
https://jira.xwiki.org/browse/XWIKI-18368 | Exploit Patch Vendor Advisory |
https://www.xwiki.org/xwiki/bin/view/Documentation/AdminGuide/Attachments#HAttachmentdisplayordownload | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2022-02-04T22:30:14
Updated: 2022-02-04T22:30:14
Reserved: 2021-11-16T00:00:00
Link: CVE-2021-43841
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-02-04T23:15:11.957
Modified: 2022-02-10T01:26:19.653
Link: CVE-2021-43841
JSON object: View
Redhat Information
No data.
CWE