You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
"summary": "XWiki Affected by Reflected Cross-Site Scripting (XSS) in Error Messages",
10
+
"details": "### Impact\nA reflected cross site scripting (XSS) vulnerability in XWiki allows an attacker to execute arbitrary actions in XWiki with the rights of the victim if the attacker manages to trick a victim into visiting a crafted URL. If the victim has administrative or programming rights, those rights can be exploited to gain full access to the XWiki installation.\n\n### Patches\nThis vulnerability has been patched in XWiki 17.8.0RC1, 17.4.5 and 16.10.12.\n\n### Workarounds\nThe [patch](https://github.com/xwiki/xwiki-platform/commit/8337ac8c3b19c37f306723b638b2cae8b0a57dbf#diff-8f16efedd19baae025db602d8736a105bfd8f72676af2c935b8195a0c356ee71) can be applied manually, only a single line in `templates/logging_macros.vm` needs to be changed, no restart is required.\n\n### References\n* https://github.com/xwiki/xwiki-platform/commit/8337ac8c3b19c37f306723b638b2cae8b0a57dbf\n* https://jira.xwiki.org/browse/XWIKI-23462\n\n### Attribution\n\nWe thank Mike Cole @mikecole-mg for discovering and reporting this vulnerability.",
"summary": "Moodle affected by a code injection vulnerability",
9
10
"details": "A flaw was found in Moodle. An attacker with access to the restore interface could trigger server-side execution of arbitrary code. This is due to insufficient validation of restore input, which leads to unintended interpretation by core restore routines. Successful exploitation could result in a full compromise of the Moodle application.",
0 commit comments