.. / CVE-2023-35160

Exploit for XWiki >= 2.5-milestone-2 - Cross-Site Scripting (CVE-2023-35160)

Description:

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Users are able to forge an URL with a payload allowing to inject Javascript in the page (XSS). It’s possible to exploit the resubmit template to perform a XSS, e.g. by using URL such as: > xwiki/bin/view/XWiki/Main xpage=resubmit&resubmit=javascript:alert(document.domain)&xback=javascript:alert(document.domain). This vulnerability exists since XWiki 2.5-milestone-2. The vulnerability has been patched in XWiki 14.10.5 and 15.1-rc-1.

Nuclei Template

View the template here CVE-2023-35160.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2023/CVE-2023-35160.yaml
Copy

References:

https://jira.xwiki.org/browse/XWIKI-20343
https://nvd.nist.gov/vuln/detail/CVE-2023-35160