Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-25815

Опубликовано: 27 сент. 2020
Источник: debian
EPSS Низкий

Описание

An issue was discovered in MediaWiki 1.32.x through 1.34.x before 1.34.4. LogEventList::getFiltersDesc is insecurely using message text to build options names for an HTML multi-select field. The relevant code should use escaped() instead of text().

Пакеты

ПакетСтатусВерсия исправленияРелизТип
mediawikifixed1:1.35.0-1package
mediawikinot-affectedbusterpackage
mediawikinot-affectedstretchpackage

Примечания

  • https://lists.wikimedia.org/pipermail/wikitech-l/2020-September/093888.html

  • https://phabricator.wikimedia.org/T256171

EPSS

Процентиль: 59%
0.00387
Низкий

Связанные уязвимости

CVSS3: 6.1
ubuntu
больше 5 лет назад

An issue was discovered in MediaWiki 1.32.x through 1.34.x before 1.34.4. LogEventList::getFiltersDesc is insecurely using message text to build options names for an HTML multi-select field. The relevant code should use escaped() instead of text().

CVSS3: 6.1
redhat
больше 5 лет назад

An issue was discovered in MediaWiki 1.32.x through 1.34.x before 1.34.4. LogEventList::getFiltersDesc is insecurely using message text to build options names for an HTML multi-select field. The relevant code should use escaped() instead of text().

CVSS3: 6.1
nvd
больше 5 лет назад

An issue was discovered in MediaWiki 1.32.x through 1.34.x before 1.34.4. LogEventList::getFiltersDesc is insecurely using message text to build options names for an HTML multi-select field. The relevant code should use escaped() instead of text().

CVSS3: 6.1
github
больше 3 лет назад

MediaWiki Cross-site Scripting (XSS) vulnerability

EPSS

Процентиль: 59%
0.00387
Низкий