org.xwiki.commons:xwiki-commons-xml@12.7-rc-1 vulnerabilities

  • latest version

    16.10.1

  • latest non vulnerable version

  • first published

    13 years ago

  • latest version published

    17 days ago

  • licenses detected

  • package manager

  • Direct Vulnerabilities

    Known vulnerabilities in the org.xwiki.commons:xwiki-commons-xml package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • C
    Cross-site Scripting (XSS)

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) such that the restricted mode of the HTML cleaner in XWiki, allowed the injection of arbitrary HTML code via invalid HTML comments. When a privileged user with programming rights visits such a comment in XWiki, the malicious JavaScript code is executed in the context of the user session.

    How to fix Cross-site Scripting (XSS)?

    Upgrade org.xwiki.commons:xwiki-commons-xml to version 14.10 or higher.

    [4.2-milestone-1,14.10)
    • H
    Cross-site Scripting (XSS)

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to improper user input sanitization when using the "restricted" mode of the HTML cleaner. Exploiting this vulnerability is possible when a privileged user with programming rights visits such a maliciously crafted comment in XWiki, the malicious JavaScript code is executed in the context of the user session.

    How to fix Cross-site Scripting (XSS)?

    Upgrade org.xwiki.commons:xwiki-commons-xml to version 14.6-rc-1 or higher.

    [4.2-milestone-1,14.6-rc-1)
    • H
    Improper Neutralization

    Affected versions of this package are vulnerable to Improper Neutralization such that any user can edit their own profile and inject code, which is going to be executed. The same vulnerability can also be exploited in all other places where short text properties are displayed, e.g., in apps created using Apps Within Minutes that use a short text field.

    How to fix Improper Neutralization?

    Upgrade org.xwiki.commons:xwiki-commons-xml to version 13.10.9, 14.7-rc-1 or higher.

    [3.1-milestone-1,13.10.9)[14.0-rc-1,14.7-rc-1)
    • M
    XML External Entity (XXE) Injection

    Affected versions of this package are vulnerable to XML External Entity (XXE) Injection. Any user with velocity script permissions can read arbitrary files, directory listing and perform SSRF through the XML script service.

    How to fix XML External Entity (XXE) Injection?

    Upgrade org.xwiki.commons:xwiki-commons-xml to version 12.10.10, 13.4.4, 13.8-rc-1 or higher.

    [,12.10.10)[13.0,13.4.4)[13.5,13.8-rc-1)