CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS
Percentile
72.0%
It’s possible for a user without any specific right to perform script injection and remote code execution just by inserting an appropriate title when creating a new Change Request.
This vulnerability is particularly critical as Change Request aims at being created by user without any particular rights.
The vulnerability has been fixed in Change Request 1.9.2.
It’s possible to workaround the issue without upgrading by editing the document ChangeRequest.Code.ChangeRequestSheet
and by performing the same change as in the commit: https://github.com/xwiki-contrib/application-changerequest/commit/7565e720117f73102f5a276239eabfe85e15cff4.
If you have any questions or comments about this advisory:
Thanks Michael Hamann for the report.
github.com/xwiki-contrib/application-changerequest
github.com/xwiki-contrib/application-changerequest/commit/7565e720117f73102f5a276239eabfe85e15cff4
github.com/xwiki-contrib/application-changerequest/security/advisories/GHSA-f776-w9v2-7vfj
jira.xwiki.org/browse/CRAPP-298
nvd.nist.gov/vuln/detail/CVE-2023-45138