Lucene search

K
githubGitHub Advisory DatabaseGHSA-2F58-VF6G-6P8X
HistoryMay 24, 2022 - 5:29 p.m.

MediaWiki Cross-site Scripting (XSS) vulnerability

2022-05-2417:29:42
CWE-79
GitHub Advisory Database
github.com
8
mediawiki
cross-site scripting
xss
logeventlist
html
multi-select
security
vulnerability

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

AI Score

6.3

Confidence

Low

EPSS

0.002

Percentile

54.5%

An issue was discovered in MediaWiki 1.32.x through 1.34.x before 1.34.4. LogEventList::getFiltersDesc is insecurely using message text to build options names for an HTML multi-select field. The relevant code should use escaped() instead of text().

Affected configurations

Vulners
Node
mediawikicoreRange1.35.0-rc.01.35.0
OR
mediawikicoreRange1.32.01.34.3
VendorProductVersionCPE
mediawikicore*cpe:2.3:a:mediawiki:core:*:*:*:*:*:*:*:*

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

AI Score

6.3

Confidence

Low

EPSS

0.002

Percentile

54.5%