Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4vr7-m8p8-434h

Опубликовано: 24 мая 2022
Источник: github
Github: Прошло ревью
CVSS3: 6.1

Описание

MediaWiki Cross-site Scripting (XSS) vulnerability

In MediaWiki before 1.31.9 and 1.32.x through 1.34.x before 1.34.3, XSS related to jQuery can occur. The attacker creates a message with [javascript:payload xss] and turns it into a jQuery object with mw.message().parse(). The expected result is that the jQuery object does not contain an tag (or it does not have a href attribute, or it's empty, etc.). The actual result is that the object contains an <a href ="javascript... that executes when clicked.

Пакеты

Наименование

mediawiki/core

composer
Затронутые версииВерсия исправления

>= 1.31.0, < 1.31.9

1.31.9

Наименование

mediawiki/core

composer
Затронутые версииВерсия исправления

>= 1.32.0, < 1.34.3

1.34.3

Наименование

mediawiki/core

composer
Затронутые версииВерсия исправления

>= 1.35.0-rc.0, < 1.35.0

1.35.0

EPSS

Процентиль: 56%
0.00336
Низкий

6.1 Medium

CVSS3

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 6.1
ubuntu
больше 5 лет назад

In MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4, XSS related to jQuery can occur. The attacker creates a message with [javascript:payload xss] and turns it into a jQuery object with mw.message().parse(). The expected result is that the jQuery object does not contain an <a> tag (or it does not have a href attribute, or it's empty, etc.). The actual result is that the object contains an <a href ="javascript... that executes when clicked.

CVSS3: 6.1
redhat
больше 5 лет назад

In MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4, XSS related to jQuery can occur. The attacker creates a message with [javascript:payload xss] and turns it into a jQuery object with mw.message().parse(). The expected result is that the jQuery object does not contain an <a> tag (or it does not have a href attribute, or it's empty, etc.). The actual result is that the object contains an <a href ="javascript... that executes when clicked.

CVSS3: 6.1
nvd
больше 5 лет назад

In MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4, XSS related to jQuery can occur. The attacker creates a message with [javascript:payload xss] and turns it into a jQuery object with mw.message().parse(). The expected result is that the jQuery object does not contain an <a> tag (or it does not have a href attribute, or it's empty, etc.). The actual result is that the object contains an <a href ="javascript... that executes when clicked.

CVSS3: 6.1
debian
больше 5 лет назад

In MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4, X ...

EPSS

Процентиль: 56%
0.00336
Низкий

6.1 Medium

CVSS3

Дефекты

CWE-79