Lucene search

K
ubuntucveUbuntu.comUB:CVE-2020-25828
HistorySep 27, 2020 - 12:00 a.m.

CVE-2020-25828

2020-09-2700:00:00
ubuntu.com
ubuntu.com
19
mediawiki
html escaping
xss
user input

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

EPSS

0.002

Percentile

54.5%

An issue was discovered in MediaWiki before 1.31.10 and 1.32.x through
1.34.x before 1.34.4. The non-jqueryMsg version of mw.message().parse()
doesn’t escape HTML. This affects both message contents (which are
generally safe) and the parameters (which can be based on user input).
(When jqueryMsg is loaded, it correctly accepts only whitelisted tags in
message contents, and escapes all parameters. Situations with an unloaded
jqueryMsg are rare in practice, but can for example occur for
Special:SpecialPages on a wiki with no extensions installed.)

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchmediawiki< anyUNKNOWN
ubuntu20.04noarchmediawiki< anyUNKNOWN

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

EPSS

0.002

Percentile

54.5%