Lucene search

K
gentooGentoo FoundationGLSA-200507-18
HistoryJul 20, 2005 - 12:00 a.m.

MediaWiki: Cross-site scripting vulnerability

2005-07-2000:00:00
Gentoo Foundation
security.gentoo.org
12

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.004 Low

EPSS

Percentile

74.1%

Background

MediaWiki is a collaborative editing software, used by big projects like Wikipedia.

Description

MediaWiki fails to escape a parameter in the page move template correctly.

Impact

By enticing a user to visit a specially crafted URL, a remote attacker could exploit this vulnerability to inject malicious JavaScript code that will be executed in a user’s browser session in the context of the vulnerable site.

Workaround

There is no known workaround at this time.

Resolution

All MediaWiki users should upgrade to the latest available version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=www-apps/mediawiki-1.4.7"
OSVersionArchitecturePackageVersionFilename
Gentooanyallwww-apps/mediawiki< 1.4.6UNKNOWN

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.004 Low

EPSS

Percentile

74.1%