MediaWiki $wgUseTidy Output Processing XSS

2005-04-20T11:53:33
ID OSVDB:15719
Type osvdb
Reporter OSVDB
Modified 2005-04-20T11:53:33

Description

Vulnerability Description

MediaWiki contains a flaw that allows a remote cross site scripting attack. This flaw, which affects MSIE clients only, exists if MediaWiki has been configured to output through HTML Tidy ($wgUseTidy) and is caused by the application not properly validating user input. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Upgrade to version 1.3.12, 1.4.2 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

MediaWiki contains a flaw that allows a remote cross site scripting attack. This flaw, which affects MSIE clients only, exists if MediaWiki has been configured to output through HTML Tidy ($wgUseTidy) and is caused by the application not properly validating user input. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

References:

Vendor URL: http://wikipedia.sourceforge.net/ Secunia Advisory ID:14993 ISS X-Force ID: 20210 CVE-2005-1245 Bugtraq ID: 13301