Описание
Mediawiki v1.40.0 does not validate namespaces used in XML files. Therefore, if the instance administrator allows XML file uploads, a remote attacker with a low-privileged user account can use this exploit to become an administrator by sending a malicious link to the instance administrator.
Релиз | Статус | Примечание |
---|---|---|
bionic | ignored | end of standard support |
devel | needs-triage | |
esm-apps/bionic | needs-triage | |
esm-apps/focal | needs-triage | |
esm-apps/jammy | needs-triage | |
esm-apps/noble | needs-triage | |
focal | ignored | end of standard support, was needs-triage |
jammy | needs-triage | |
lunar | ignored | end of life, was needs-triage |
mantic | ignored | end of life, was needs-triage |
Показывать по
7.3 High
CVSS3
Связанные уязвимости
Mediawiki v1.40.0 does not validate namespaces used in XML files. Therefore, if the instance administrator allows XML file uploads, a remote attacker with a low-privileged user account can use this exploit to become an administrator by sending a malicious link to the instance administrator.
Mediawiki v1.40.0 does not validate namespaces used in XML files. Therefore, if the instance administrator allows XML file uploads, a remote attacker with a low-privileged user account can use this exploit to become an administrator by sending a malicious link to the instance administrator.
Mediawiki v1.40.0 does not validate namespaces used in XML files. The ...
MediaWiki malicious XML upload leads to privilege escalation
Уязвимость программного средства для реализации гипертекстовой среды MediaWiki, существующая из-за непринятия мер по защите структуры веб-страницы, позволяющая нарушителю провести атаку межсайтового скриптинга (XSS)
7.3 High
CVSS3