Lucene search

K
ubuntucveUbuntu.comUB:CVE-2020-25828
HistorySep 27, 2020 - 12:00 a.m.

CVE-2020-25828

2020-09-2700:00:00
ubuntu.com
ubuntu.com
11

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

42.4%

An issue was discovered in MediaWiki before 1.31.10 and 1.32.x through
1.34.x before 1.34.4. The non-jqueryMsg version of mw.message().parse()
doesn’t escape HTML. This affects both message contents (which are
generally safe) and the parameters (which can be based on user input).
(When jqueryMsg is loaded, it correctly accepts only whitelisted tags in
message contents, and escapes all parameters. Situations with an unloaded
jqueryMsg are rare in practice, but can for example occur for
Special:SpecialPages on a wiki with no extensions installed.)

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchmediawiki< anyUNKNOWN
ubuntu20.04noarchmediawiki< anyUNKNOWN

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

42.4%