Описание
Mediawiki v1.40.0 does not validate namespaces used in XML files.
Therefore, if the instance administrator allows XML file uploads,
a remote attacker with a low-privileged user account can use this
exploit to become an administrator by sending a malicious link to
the instance administrator.
Ссылки
- ExploitThird Party Advisory
- Mailing ListThird Party Advisory
- Third Party Advisory
- Product
- ExploitThird Party Advisory
- Mailing ListThird Party Advisory
- Third Party Advisory
- Product
Уязвимые конфигурации
Одно из
EPSS
7.3 High
CVSS3
9 Critical
CVSS3
Дефекты
Связанные уязвимости
Mediawiki v1.40.0 does not validate namespaces used in XML files. Therefore, if the instance administrator allows XML file uploads, a remote attacker with a low-privileged user account can use this exploit to become an administrator by sending a malicious link to the instance administrator.
Mediawiki v1.40.0 does not validate namespaces used in XML files. Therefore, if the instance administrator allows XML file uploads, a remote attacker with a low-privileged user account can use this exploit to become an administrator by sending a malicious link to the instance administrator.
Mediawiki v1.40.0 does not validate namespaces used in XML files. The ...
MediaWiki malicious XML upload leads to privilege escalation
Уязвимость программного средства для реализации гипертекстовой среды MediaWiki, существующая из-за непринятия мер по защите структуры веб-страницы, позволяющая нарушителю провести атаку межсайтового скриптинга (XSS)
EPSS
7.3 High
CVSS3
9 Critical
CVSS3