CVE-2023-35156

9.6 CRITICAL

📋 TL;DR

This is a cross-site scripting (XSS) vulnerability in XWiki Platform that allows attackers to inject malicious JavaScript via specially crafted URLs. Attackers can exploit the delete template to execute arbitrary code in victims' browsers. All XWiki installations from version 6.0-rc-1 through 14.10.5 are affected.

💻 Affected Systems

Products:
  • XWiki Platform
Versions: 6.0-rc-1 through 14.10.5
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Partial patch in 14.10.5 was insufficient; complete fix requires 14.10.6 or 15.1+

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete account takeover, session hijacking, credential theft, and remote code execution through browser exploitation chains.

🟠

Likely Case

Session hijacking, account compromise, data theft, and privilege escalation for authenticated users.

🟢

If Mitigated

Limited impact with proper content security policies, input validation, and user awareness training.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit example provided in advisory; simple URL manipulation required

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 14.10.6 or 15.1

Vendor Advisory: https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-834c-x29c-f42c

Restart Required: Yes

Instructions:

1. Backup your XWiki installation. 2. Upgrade to XWiki 14.10.6 or 15.1+. 3. Restart the XWiki service. 4. Verify the fix by checking version and testing exploit URL.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side validation to reject URLs containing javascript: protocol in xredirect parameter

Configure web application firewall to block requests with 'javascript:' in URL parameters
Implement custom filter in XWiki to sanitize xredirect parameter

Content Security Policy

all

Implement strict CSP headers to prevent script execution from untrusted sources

Add 'Content-Security-Policy: script-src 'self'' to web server configuration

🧯 If You Can't Patch

  • Implement web application firewall rules to block malicious URL patterns
  • Disable or restrict access to vulnerable templates and endpoints

🔍 How to Verify

Check if Vulnerable:

Test with crafted URL: xwiki/bin/get/FlamingoThemes/Cerulean?xpage=xpart&vm=delete.vm&xredirect=javascript:alert('test')

Check Version:

Check XWiki administration panel or view page source for version information

Verify Fix Applied:

After patching, same test URL should not execute JavaScript; check version is 14.10.6+ or 15.1+

📡 Detection & Monitoring

Log Indicators:

  • URLs containing 'javascript:' in parameters
  • Access to delete.vm template with suspicious redirects
  • Unusual user agent patterns

Network Indicators:

  • HTTP requests with javascript: protocol in query parameters
  • Abnormal redirect patterns

SIEM Query:

web.url:*javascript:* AND (web.url:*delete.vm* OR web.url:*xredirect*)

🔗 References

📤 Share & Export