All the vulnerabilites related to MediaWiki - MediaWiki
cve-2014-3454
Vulnerability from cvelistv5
Published
2014-05-12 14:00
Modified
2024-09-16 22:46
Severity ?
EPSS score ?
Summary
Cross-site request forgery (CSRF) vulnerability in Special:CreateCategory in the SemanticForms extension for MediaWiki before 1.19.10, 1.2x before 1.21.4, and 1.22.x before 1.22.1 allows remote attackers to hijack the authentication of users for requests that create categories via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000138.html | mailing-list, x_refsource_MLIST | |
https://bugzilla.wikimedia.org/show_bug.cgi?id=57025 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:43:06.115Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[MediaWiki-announce] 20140114 MediaWiki Security Releases: 1.22.1, 1.21.4 and 1.19.10", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000138.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=57025" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability in Special:CreateCategory in the SemanticForms extension for MediaWiki before 1.19.10, 1.2x before 1.21.4, and 1.22.x before 1.22.1 allows remote attackers to hijack the authentication of users for requests that create categories via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-05-12T14:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[MediaWiki-announce] 20140114 MediaWiki Security Releases: 1.22.1, 1.21.4 and 1.19.10", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000138.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=57025" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-3454", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site request forgery (CSRF) vulnerability in Special:CreateCategory in the SemanticForms extension for MediaWiki before 1.19.10, 1.2x before 1.21.4, and 1.22.x before 1.22.1 allows remote attackers to hijack the authentication of users for requests that create categories via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[MediaWiki-announce] 20140114 MediaWiki Security Releases: 1.22.1, 1.21.4 and 1.19.10", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000138.html" }, { "name": "https://bugzilla.wikimedia.org/show_bug.cgi?id=57025", "refsource": "CONFIRM", "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=57025" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-3454", "datePublished": "2014-05-12T14:00:00Z", "dateReserved": "2014-05-12T00:00:00Z", "dateUpdated": "2024-09-16T22:46:54.034Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-35626
Vulnerability from cvelistv5
Published
2020-12-21 22:34
Modified
2024-08-04 17:09
Severity ?
EPSS score ?
Summary
An issue was discovered in the PushToWatch extension for MediaWiki through 1.35.1. The primary form did not implement an anti-CSRF token and therefore was completely vulnerable to CSRF attacks against onSkinAddFooterLinks in PushToWatch.php.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T268641 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/14dc79b1f44c2a1ca6b1192284206c7b8626fb57 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:09:15.104Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T268641" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/14dc79b1f44c2a1ca6b1192284206c7b8626fb57" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the PushToWatch extension for MediaWiki through 1.35.1. The primary form did not implement an anti-CSRF token and therefore was completely vulnerable to CSRF attacks against onSkinAddFooterLinks in PushToWatch.php." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-21T22:34:06", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T268641" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/14dc79b1f44c2a1ca6b1192284206c7b8626fb57" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-35626", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in the PushToWatch extension for MediaWiki through 1.35.1. The primary form did not implement an anti-CSRF token and therefore was completely vulnerable to CSRF attacks against onSkinAddFooterLinks in PushToWatch.php." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T268641", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T268641" }, { "name": "https://gerrit.wikimedia.org/r/q/14dc79b1f44c2a1ca6b1192284206c7b8626fb57", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/14dc79b1f44c2a1ca6b1192284206c7b8626fb57" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-35626", "datePublished": "2020-12-21T22:34:06", "dateReserved": "2020-12-21T00:00:00", "dateUpdated": "2024-08-04T17:09:15.104Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-2931
Vulnerability from cvelistv5
Published
2015-04-13 14:00
Modified
2024-08-06 05:32
Severity ?
EPSS score ?
Summary
Incomplete blacklist vulnerability in includes/upload/UploadBase.php in MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2 allows remote attackers to inject arbitrary web script or HTML via an application/xml MIME type for a nested SVG with a data: URI.
References
▼ | URL | Tags |
---|---|---|
https://security.gentoo.org/glsa/201510-05 | vendor-advisory, x_refsource_GENTOO | |
http://www.mandriva.com/security/advisories?name=MDVSA-2015:200 | vendor-advisory, x_refsource_MANDRIVA | |
http://www.securityfocus.com/bid/73477 | vdb-entry, x_refsource_BID | |
https://phabricator.wikimedia.org/T85850 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2015/04/07/3 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2015/04/01/1 | mailing-list, x_refsource_MLIST | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:32:20.646Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201510-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201510-05" }, { "name": "MDVSA-2015:200", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:200" }, { "name": "73477", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/73477" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T85850" }, { "name": "[oss-security] 20150407 Re: CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/04/07/3" }, { "name": "[oss-security] 20150331 CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/04/01/1" }, { "name": "[MediaWiki-announce] 20150331 MediaWiki Security and Maintenance Releases: 1.19.24, 1.23.9, and 1.24.2", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-03-31T00:00:00", "descriptions": [ { "lang": "en", "value": "Incomplete blacklist vulnerability in includes/upload/UploadBase.php in MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2 allows remote attackers to inject arbitrary web script or HTML via an application/xml MIME type for a nested SVG with a data: URI." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-05T21:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "GLSA-201510-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201510-05" }, { "name": "MDVSA-2015:200", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:200" }, { "name": "73477", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/73477" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T85850" }, { "name": "[oss-security] 20150407 Re: CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/04/07/3" }, { "name": "[oss-security] 20150331 CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/04/01/1" }, { "name": "[MediaWiki-announce] 20150331 MediaWiki Security and Maintenance Releases: 1.19.24, 1.23.9, and 1.24.2", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-2931", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Incomplete blacklist vulnerability in includes/upload/UploadBase.php in MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2 allows remote attackers to inject arbitrary web script or HTML via an application/xml MIME type for a nested SVG with a data: URI." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201510-05", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201510-05" }, { "name": "MDVSA-2015:200", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:200" }, { "name": "73477", "refsource": "BID", "url": "http://www.securityfocus.com/bid/73477" }, { "name": "https://phabricator.wikimedia.org/T85850", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T85850" }, { "name": "[oss-security] 20150407 Re: CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/04/07/3" }, { "name": "[oss-security] 20150331 CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/04/01/1" }, { "name": "[MediaWiki-announce] 20150331 MediaWiki Security and Maintenance Releases: 1.19.24, 1.23.9, and 1.24.2", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-2931", "datePublished": "2015-04-13T14:00:00", "dateReserved": "2015-04-07T00:00:00", "dateUpdated": "2024-08-06T05:32:20.646Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-4361
Vulnerability from cvelistv5
Published
2012-01-08 11:00
Modified
2024-08-07 00:09
Severity ?
EPSS score ?
Summary
MediaWiki before 1.17.1 does not check for read permission before handling action=ajax requests, which allows remote attackers to obtain sensitive information by (1) leveraging the SpecialUpload::ajaxGetExistsWarning function, or by (2) leveraging an extension, as demonstrated by the CategoryTree, ExtTab, and InlineEditor extensions.
References
▼ | URL | Tags |
---|---|---|
http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-November/000104.html | mailing-list, x_refsource_MLIST | |
https://bugzilla.redhat.com/show_bug.cgi?id=758171 | x_refsource_CONFIRM | |
http://openwall.com/lists/oss-security/2011/11/29/6 | mailing-list, x_refsource_MLIST | |
https://bugzilla.wikimedia.org/show_bug.cgi?id=32616 | x_refsource_CONFIRM | |
http://openwall.com/lists/oss-security/2011/11/29/12 | mailing-list, x_refsource_MLIST | |
http://www.debian.org/security/2011/dsa-2366 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:09:18.393Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[mediawiki-announce] 20111128 MediaWiki security release 1.17.1", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-November/000104.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=758171" }, { "name": "[oss-security] 20111129 CVE request: mediawiki before 1.17.1", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/11/29/6" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=32616" }, { "name": "[oss-security] 20111129 Re: CVE request: mediawiki before 1.17.1", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/11/29/12" }, { "name": "DSA-2366", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2366" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-11-28T00:00:00", "descriptions": [ { "lang": "en", "value": "MediaWiki before 1.17.1 does not check for read permission before handling action=ajax requests, which allows remote attackers to obtain sensitive information by (1) leveraging the SpecialUpload::ajaxGetExistsWarning function, or by (2) leveraging an extension, as demonstrated by the CategoryTree, ExtTab, and InlineEditor extensions." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-01-19T10:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[mediawiki-announce] 20111128 MediaWiki security release 1.17.1", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-November/000104.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=758171" }, { "name": "[oss-security] 20111129 CVE request: mediawiki before 1.17.1", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/11/29/6" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=32616" }, { "name": "[oss-security] 20111129 Re: CVE request: mediawiki before 1.17.1", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/11/29/12" }, { "name": "DSA-2366", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2366" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-4361", "datePublished": "2012-01-08T11:00:00", "dateReserved": "2011-11-04T00:00:00", "dateUpdated": "2024-08-07T00:09:18.393Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28205
Vulnerability from cvelistv5
Published
2022-03-30 00:00
Modified
2024-08-03 05:48
Severity ?
EPSS score ?
Summary
An issue was discovered in MediaWiki through 1.37.1. The CentralAuth extension mishandles a ttl issue for groups expiring in the future.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:48:37.543Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/Ic6ba1a37b78df5b342ceeba4c1493dbde583b81f" }, { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T302248" }, { "name": "GLSA-202305-24", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202305-24" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MediaWiki through 1.37.1. The CentralAuth extension mishandles a ttl issue for groups expiring in the future." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-21T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://gerrit.wikimedia.org/r/q/Ic6ba1a37b78df5b342ceeba4c1493dbde583b81f" }, { "url": "https://phabricator.wikimedia.org/T302248" }, { "name": "GLSA-202305-24", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202305-24" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-28205", "datePublished": "2022-03-30T00:00:00", "dateReserved": "2022-03-30T00:00:00", "dateUpdated": "2024-08-03T05:48:37.543Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-8812
Vulnerability from cvelistv5
Published
2017-11-15 08:00
Modified
2024-08-05 16:48
Severity ?
EPSS score ?
Summary
MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2 allows remote attackers to inject > (greater than) characters via the id attribute of a headline.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1039812 | vdb-entry, x_refsource_SECTRACK | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-November/000216.html | x_refsource_CONFIRM | |
https://www.debian.org/security/2017/dsa-4036 | vendor-advisory, x_refsource_DEBIAN |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2 |
Version: MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T16:48:22.653Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1039812", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039812" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-November/000216.html" }, { "name": "DSA-4036", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2017/dsa-4036" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2", "vendor": "n/a", "versions": [ { "status": "affected", "version": "MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2" } ] } ], "datePublic": "2017-11-15T00:00:00", "descriptions": [ { "lang": "en", "value": "MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2 allows remote attackers to inject \u003e (greater than) characters via the id attribute of a headline." } ], "problemTypes": [ { "descriptions": [ { "description": "greater than injection", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-16T10:57:01", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "name": "1039812", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039812" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-November/000216.html" }, { "name": "DSA-4036", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2017/dsa-4036" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "ID": "CVE-2017-8812", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2", "version": { "version_data": [ { "version_value": "MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2 allows remote attackers to inject \u003e (greater than) characters via the id attribute of a headline." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "greater than injection" } ] } ] }, "references": { "reference_data": [ { "name": "1039812", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039812" }, { "name": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-November/000216.html", "refsource": "CONFIRM", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-November/000216.html" }, { "name": "DSA-4036", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2017/dsa-4036" } ] } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2017-8812", "datePublished": "2017-11-15T08:00:00", "dateReserved": "2017-05-07T00:00:00", "dateUpdated": "2024-08-05T16:48:22.653Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41766
Vulnerability from cvelistv5
Published
2023-05-29 00:00
Modified
2024-08-03 12:49
Severity ?
EPSS score ?
Summary
An issue was discovered in MediaWiki before 1.35.8, 1.36.x and 1.37.x before 1.37.5, and 1.38.x before 1.38.3. Upon an action=rollback operation, the alreadyrolled message can leak a user name (when the user has been revision deleted/suppressed).
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:44.041Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T307278" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MediaWiki before 1.35.8, 1.36.x and 1.37.x before 1.37.5, and 1.38.x before 1.38.3. Upon an action=rollback operation, the alreadyrolled message can leak a user name (when the user has been revision deleted/suppressed)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-29T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T307278" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-41766", "datePublished": "2023-05-29T00:00:00", "dateReserved": "2022-09-29T00:00:00", "dateUpdated": "2024-08-03T12:49:44.041Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-9476
Vulnerability from cvelistv5
Published
2015-01-16 16:00
Modified
2024-08-06 13:47
Severity ?
EPSS score ?
Summary
MediaWiki 1.2x before 1.22.15, 1.23.x before 1.23.8, and 1.24.x before 1.24.1 allows remote attackers to bypass CORS restrictions in $wgCrossSiteAJAXdomains via a domain that has a partial match to an allowed origin, as demonstrated by "http://en.wikipedia.org.evilsite.example/."
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T77028 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2015/01/03/13 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2014/12/21/2 | mailing-list, x_refsource_MLIST | |
http://www.mandriva.com/security/advisories?name=MDVSA-2015:006 | vendor-advisory, x_refsource_MANDRIVA | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-December/000173.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:47:41.126Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T77028" }, { "name": "[oss-security] 20150103 Re: CVE Request: Mediawiki security releases 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/01/03/13" }, { "name": "[oss-security] 20141221 CVE Request: Mediawiki security releases 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/12/21/2" }, { "name": "MDVSA-2015:006", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:006" }, { "name": "[MediaWiki-announce] 20141217 MediaWiki Security and Maintenance Releases: 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-December/000173.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-12-17T00:00:00", "descriptions": [ { "lang": "en", "value": "MediaWiki 1.2x before 1.22.15, 1.23.x before 1.23.8, and 1.24.x before 1.24.1 allows remote attackers to bypass CORS restrictions in $wgCrossSiteAJAXdomains via a domain that has a partial match to an allowed origin, as demonstrated by \"http://en.wikipedia.org.evilsite.example/.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-02-04T17:57:00", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T77028" }, { "name": "[oss-security] 20150103 Re: CVE Request: Mediawiki security releases 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/01/03/13" }, { "name": "[oss-security] 20141221 CVE Request: Mediawiki security releases 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/12/21/2" }, { "name": "MDVSA-2015:006", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:006" }, { "name": "[MediaWiki-announce] 20141217 MediaWiki Security and Maintenance Releases: 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-December/000173.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "ID": "CVE-2014-9476", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MediaWiki 1.2x before 1.22.15, 1.23.x before 1.23.8, and 1.24.x before 1.24.1 allows remote attackers to bypass CORS restrictions in $wgCrossSiteAJAXdomains via a domain that has a partial match to an allowed origin, as demonstrated by \"http://en.wikipedia.org.evilsite.example/.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T77028", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T77028" }, { "name": "[oss-security] 20150103 Re: CVE Request: Mediawiki security releases 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/01/03/13" }, { "name": "[oss-security] 20141221 CVE Request: Mediawiki security releases 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/12/21/2" }, { "name": "MDVSA-2015:006", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:006" }, { "name": "[MediaWiki-announce] 20141217 MediaWiki Security and Maintenance Releases: 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-December/000173.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2014-9476", "datePublished": "2015-01-16T16:00:00", "dateReserved": "2015-01-03T00:00:00", "dateUpdated": "2024-08-06T13:47:41.126Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-0365
Vulnerability from cvelistv5
Published
2018-04-13 16:00
Modified
2024-09-16 18:03
Severity ?
EPSS score ?
Summary
Mediawiki before 1.28.1 / 1.27.2 / 1.23.16 contains a XSS vulnerability in SearchHighlighter::highlightText() with non-default configurations.
References
▼ | URL | Tags |
---|---|---|
https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html | mailing-list, x_refsource_MLIST | |
https://phabricator.wikimedia.org/T144845 | x_refsource_CONFIRM | |
https://security-tracker.debian.org/tracker/CVE-2017-0365 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T13:03:56.927Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[mediawiki-announce] 20170406 Security Release: 1.28.1 / 1.27.2 / 1.23.16", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T144845" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security-tracker.debian.org/tracker/CVE-2017-0365" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "mediawiki", "vendor": "mediawiki", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-04-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Mediawiki before 1.28.1 / 1.27.2 / 1.23.16 contains a XSS vulnerability in SearchHighlighter::highlightText() with non-default configurations." } ], "problemTypes": [ { "descriptions": [ { "description": "cross-site scripting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-04-13T15:57:01", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "name": "[mediawiki-announce] 20170406 Security Release: 1.28.1 / 1.27.2 / 1.23.16", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T144845" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security-tracker.debian.org/tracker/CVE-2017-0365" } ], "source": { "advisory": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html", "discovery": "UNKNOWN" }, "title": "XSS in SearchHighlighter::highlightText() [requires non-default config]", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "DATE_PUBLIC": "2017-04-06T20:49:00.000Z", "ID": "CVE-2017-0365", "STATE": "PUBLIC", "TITLE": "XSS in SearchHighlighter::highlightText() [requires non-default config]" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "mediawiki", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "mediawiki" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Mediawiki before 1.28.1 / 1.27.2 / 1.23.16 contains a XSS vulnerability in SearchHighlighter::highlightText() with non-default configurations." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "cross-site scripting" } ] } ] }, "references": { "reference_data": [ { "name": "[mediawiki-announce] 20170406 Security Release: 1.28.1 / 1.27.2 / 1.23.16", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html" }, { "name": "https://phabricator.wikimedia.org/T144845", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T144845" }, { "name": "https://security-tracker.debian.org/tracker/CVE-2017-0365", "refsource": "CONFIRM", "url": "https://security-tracker.debian.org/tracker/CVE-2017-0365" } ] }, "source": { "advisory": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2017-0365", "datePublished": "2018-04-13T16:00:00Z", "dateReserved": "2016-11-29T00:00:00", "dateUpdated": "2024-09-16T18:03:35.711Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-8009
Vulnerability from cvelistv5
Published
2017-07-25 14:00
Modified
2024-08-06 08:06
Severity ?
EPSS score ?
Summary
The MWOAuthDataStore::lookup_token function in Extension:OAuth for MediaWiki 1.25.x before 1.25.3, 1.24.x before 1.24.4, and before 1.23.11 does not properly validate the signature when checking the authorization signature, which allows remote registered Consumers to use another Consumer's credentials by leveraging knowledge of the credentials.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1034028 | vdb-entry, x_refsource_SECTRACK | |
https://phabricator.wikimedia.org/T103023 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2015/10/29/14 | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:06:31.525Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1034028", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1034028" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T103023" }, { "name": "[oss-security] 20151029 Re: CVE Request: MediaWiki 1.25.3, 1.24.4 and 1.23.11", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/10/29/14" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-10-19T00:00:00", "descriptions": [ { "lang": "en", "value": "The MWOAuthDataStore::lookup_token function in Extension:OAuth for MediaWiki 1.25.x before 1.25.3, 1.24.x before 1.24.4, and before 1.23.11 does not properly validate the signature when checking the authorization signature, which allows remote registered Consumers to use another Consumer\u0027s credentials by leveraging knowledge of the credentials." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-14T09:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1034028", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1034028" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T103023" }, { "name": "[oss-security] 20151029 Re: CVE Request: MediaWiki 1.25.3, 1.24.4 and 1.23.11", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/10/29/14" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-8009", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The MWOAuthDataStore::lookup_token function in Extension:OAuth for MediaWiki 1.25.x before 1.25.3, 1.24.x before 1.24.4, and before 1.23.11 does not properly validate the signature when checking the authorization signature, which allows remote registered Consumers to use another Consumer\u0027s credentials by leveraging knowledge of the credentials." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1034028", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034028" }, { "name": "https://phabricator.wikimedia.org/T103023", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T103023" }, { "name": "[oss-security] 20151029 Re: CVE Request: MediaWiki 1.25.3, 1.24.4 and 1.23.11", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/10/29/14" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-8009", "datePublished": "2017-07-25T14:00:00", "dateReserved": "2015-10-28T00:00:00", "dateUpdated": "2024-08-06T08:06:31.525Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-6453
Vulnerability from cvelistv5
Published
2014-05-12 14:00
Modified
2024-08-06 17:39
Severity ?
EPSS score ?
Summary
MediaWiki before 1.19.10, 1.2x before 1.21.4, and 1.22.x before 1.22.1 does not properly sanitize SVG files, which allows remote attackers to have unspecified impact via invalid XML.
References
▼ | URL | Tags |
---|---|---|
http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000138.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T17:39:01.310Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[MediaWiki-announce] 20140114 MediaWiki Security Releases: 1.22.1, 1.21.4 and 1.19.10", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000138.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-01-14T00:00:00", "descriptions": [ { "lang": "en", "value": "MediaWiki before 1.19.10, 1.2x before 1.21.4, and 1.22.x before 1.22.1 does not properly sanitize SVG files, which allows remote attackers to have unspecified impact via invalid XML." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-05-12T13:57:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[MediaWiki-announce] 20140114 MediaWiki Security Releases: 1.22.1, 1.21.4 and 1.19.10", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000138.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-6453", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MediaWiki before 1.19.10, 1.2x before 1.21.4, and 1.22.x before 1.22.1 does not properly sanitize SVG files, which allows remote attackers to have unspecified impact via invalid XML." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[MediaWiki-announce] 20140114 MediaWiki Security Releases: 1.22.1, 1.21.4 and 1.19.10", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000138.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-6453", "datePublished": "2014-05-12T14:00:00", "dateReserved": "2013-11-04T00:00:00", "dateUpdated": "2024-08-06T17:39:01.310Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-0505
Vulnerability from cvelistv5
Published
2018-10-04 20:00
Modified
2024-09-16 18:48
Severity ?
EPSS score ?
Summary
Mediawiki 1.31 before 1.31.1, 1.30.1, 1.29.3 and 1.27.5 contains a flaw where BotPasswords can bypass CentralAuth's account lock
References
▼ | URL | Tags |
---|---|---|
https://lists.wikimedia.org/pipermail/wikitech-l/2018-September/090849.html | mailing-list, x_refsource_MLIST | |
https://phabricator.wikimedia.org/T194605 | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1041695 | vdb-entry, x_refsource_SECTRACK | |
https://www.debian.org/security/2018/dsa-4301 | vendor-advisory, x_refsource_DEBIAN | |
https://access.redhat.com/errata/RHSA-2019:3142 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2019:3238 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2019:3813 | vendor-advisory, x_refsource_REDHAT |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:28:11.001Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[wikitech-l] 20180920 Security release: 1.27.5 / 1.29.3 / 1.30.1 / 1.31.1", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2018-September/090849.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T194605" }, { "name": "1041695", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1041695" }, { "name": "DSA-4301", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4301" }, { "name": "RHSA-2019:3142", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:3142" }, { "name": "RHSA-2019:3238", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:3238" }, { "name": "RHSA-2019:3813", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:3813" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "mediawiki", "vendor": "mediawiki", "versions": [ { "status": "affected", "version": "before 1.31.1, 1.30.1, 1.29.3 and 1.27.5" } ] } ], "datePublic": "2018-09-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Mediawiki 1.31 before 1.31.1, 1.30.1, 1.29.3 and 1.27.5 contains a flaw where BotPasswords can bypass CentralAuth\u0027s account lock" } ], "problemTypes": [ { "descriptions": [ { "description": "Authentication bypass", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-07T18:06:38", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "name": "[wikitech-l] 20180920 Security release: 1.27.5 / 1.29.3 / 1.30.1 / 1.31.1", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2018-September/090849.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T194605" }, { "name": "1041695", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1041695" }, { "name": "DSA-4301", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4301" }, { "name": "RHSA-2019:3142", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:3142" }, { "name": "RHSA-2019:3238", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:3238" }, { "name": "RHSA-2019:3813", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:3813" } ], "source": { "discovery": "UNKNOWN" }, "title": "BotPasswords can bypass CentralAuth\u0027s account lock", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "DATE_PUBLIC": "2018-09-20T21:18:00.000Z", "ID": "CVE-2018-0505", "STATE": "PUBLIC", "TITLE": "BotPasswords can bypass CentralAuth\u0027s account lock" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "mediawiki", "version": { "version_data": [ { "version_value": "before 1.31.1, 1.30.1, 1.29.3 and 1.27.5" } ] } } ] }, "vendor_name": "mediawiki" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Mediawiki 1.31 before 1.31.1, 1.30.1, 1.29.3 and 1.27.5 contains a flaw where BotPasswords can bypass CentralAuth\u0027s account lock" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Authentication bypass" } ] } ] }, "references": { "reference_data": [ { "name": "[wikitech-l] 20180920 Security release: 1.27.5 / 1.29.3 / 1.30.1 / 1.31.1", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2018-September/090849.html" }, { "name": "https://phabricator.wikimedia.org/T194605", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T194605" }, { "name": "1041695", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041695" }, { "name": "DSA-4301", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4301" }, { "name": "RHSA-2019:3142", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3142" }, { "name": "RHSA-2019:3238", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3238" }, { "name": "RHSA-2019:3813", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3813" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2018-0505", "datePublished": "2018-10-04T20:00:00Z", "dateReserved": "2017-11-27T00:00:00", "dateUpdated": "2024-09-16T18:48:38.021Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-29140
Vulnerability from cvelistv5
Published
2023-03-31 00:00
Modified
2024-08-02 14:00
Severity ?
EPSS score ?
Summary
An issue was discovered in the GrowthExperiments extension for MediaWiki through 1.39.3. Attackers might be able to see edits for which the username has been hidden, because there is no check for rev_deleted.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T14:00:15.959Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T327613" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the GrowthExperiments extension for MediaWiki through 1.39.3. Attackers might be able to see edits for which the username has been hidden, because there is no check for rev_deleted." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-31T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T327613" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-29140", "datePublished": "2023-03-31T00:00:00", "dateReserved": "2023-03-31T00:00:00", "dateUpdated": "2024-08-02T14:00:15.959Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46148
Vulnerability from cvelistv5
Published
2022-01-07 05:54
Modified
2024-08-04 05:02
Severity ?
EPSS score ?
Summary
An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. Some unprivileged users can view confidential information (e.g., IP addresses and User-Agent headers for election traffic) on a testwiki SecurePoll instance.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T290808 | x_refsource_MISC | |
https://phabricator.wikimedia.org/T290856 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/Ib2715adb281f8892b586dcb1895e87ac0eb548b0 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:02:10.305Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T290808" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T290856" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/Ib2715adb281f8892b586dcb1895e87ac0eb548b0" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. Some unprivileged users can view confidential information (e.g., IP addresses and User-Agent headers for election traffic) on a testwiki SecurePoll instance." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T05:54:13", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T290808" }, { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T290856" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/Ib2715adb281f8892b586dcb1895e87ac0eb548b0" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-46148", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. Some unprivileged users can view confidential information (e.g., IP addresses and User-Agent headers for election traffic) on a testwiki SecurePoll instance." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T290808", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T290808" }, { "name": "https://phabricator.wikimedia.org/T290856", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T290856" }, { "name": "https://gerrit.wikimedia.org/r/q/Ib2715adb281f8892b586dcb1895e87ac0eb548b0", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/Ib2715adb281f8892b586dcb1895e87ac0eb548b0" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-46148", "datePublished": "2022-01-07T05:54:13", "dateReserved": "2022-01-07T00:00:00", "dateUpdated": "2024-08-04T05:02:10.305Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-35475
Vulnerability from cvelistv5
Published
2020-12-18 07:32
Modified
2024-08-04 17:02
Severity ?
EPSS score ?
Summary
In MediaWiki before 1.35.1, the messages userrights-expiry-current and userrights-expiry-none can contain raw HTML. XSS can happen when a user visits Special:UserRights but does not have rights to change all userrights, and the table on the left side has unchangeable groups in it. (The right column with the changeable groups is not affected and is escaped correctly.)
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T268917 | x_refsource_MISC | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2020-December/000268.html | x_refsource_MISC | |
https://www.debian.org/security/2020/dsa-4816 | vendor-advisory, x_refsource_DEBIAN | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STT5Z4A3BCXVH3WIPICWU2FP4IPIMUPC/ | vendor-advisory, x_refsource_FEDORA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:02:08.062Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T268917" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2020-December/000268.html" }, { "name": "DSA-4816", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2020/dsa-4816" }, { "name": "FEDORA-2020-0be2d40e13", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STT5Z4A3BCXVH3WIPICWU2FP4IPIMUPC/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In MediaWiki before 1.35.1, the messages userrights-expiry-current and userrights-expiry-none can contain raw HTML. XSS can happen when a user visits Special:UserRights but does not have rights to change all userrights, and the table on the left side has unchangeable groups in it. (The right column with the changeable groups is not affected and is escaped correctly.)" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-27T03:06:15", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T268917" }, { "tags": [ "x_refsource_MISC" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2020-December/000268.html" }, { "name": "DSA-4816", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2020/dsa-4816" }, { "name": "FEDORA-2020-0be2d40e13", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STT5Z4A3BCXVH3WIPICWU2FP4IPIMUPC/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-35475", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In MediaWiki before 1.35.1, the messages userrights-expiry-current and userrights-expiry-none can contain raw HTML. XSS can happen when a user visits Special:UserRights but does not have rights to change all userrights, and the table on the left side has unchangeable groups in it. (The right column with the changeable groups is not affected and is escaped correctly.)" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T268917", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T268917" }, { "name": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2020-December/000268.html", "refsource": "MISC", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2020-December/000268.html" }, { "name": "DSA-4816", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4816" }, { "name": "FEDORA-2020-0be2d40e13", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STT5Z4A3BCXVH3WIPICWU2FP4IPIMUPC/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-35475", "datePublished": "2020-12-18T07:32:34", "dateReserved": "2020-12-16T00:00:00", "dateUpdated": "2024-08-04T17:02:08.062Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34912
Vulnerability from cvelistv5
Published
2022-07-02 00:00
Modified
2024-08-03 09:22
Severity ?
EPSS score ?
Summary
An issue was discovered in MediaWiki before 1.37.3 and 1.38.x before 1.38.1. The contributions-title, used on Special:Contributions, is used as page title without escaping. Hence, in a non-default configuration where a username contains HTML entities, it won't be escaped.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:22:10.828Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T308473" }, { "name": "FEDORA-2022-f83aec6d57", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7N5ZBWLNNPZKFK7Q4KEHGCJ2YELQEUJP/" }, { "name": "FEDORA-2022-bca2c95559", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKKOQXPYLMBSEVDHFS32BPBR3ZQJKY5B/" }, { "name": "[debian-lts-announce] 20220922 [SECURITY] [DLA 3117-1] mediawiki security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00027.html" }, { "name": "DSA-5246", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2022/dsa-5246" }, { "name": "GLSA-202305-24", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202305-24" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MediaWiki before 1.37.3 and 1.38.x before 1.38.1. The contributions-title, used on Special:Contributions, is used as page title without escaping. Hence, in a non-default configuration where a username contains HTML entities, it won\u0027t be escaped." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-21T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T308473" }, { "name": "FEDORA-2022-f83aec6d57", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7N5ZBWLNNPZKFK7Q4KEHGCJ2YELQEUJP/" }, { "name": "FEDORA-2022-bca2c95559", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKKOQXPYLMBSEVDHFS32BPBR3ZQJKY5B/" }, { "name": "[debian-lts-announce] 20220922 [SECURITY] [DLA 3117-1] mediawiki security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00027.html" }, { "name": "DSA-5246", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2022/dsa-5246" }, { "name": "GLSA-202305-24", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202305-24" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-34912", "datePublished": "2022-07-02T00:00:00", "dateReserved": "2022-07-02T00:00:00", "dateUpdated": "2024-08-03T09:22:10.828Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-37305
Vulnerability from cvelistv5
Published
2023-06-30 00:00
Modified
2024-11-26 16:16
Severity ?
EPSS score ?
Summary
An issue was discovered in the ProofreadPage (aka Proofread Page) extension for MediaWiki through 1.39.3. In includes/Page/PageContentHandler.php and includes/Page/PageDisplayHandler.php, hidden users can be exposed via public interfaces.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:09:34.177Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T326952" }, { "tags": [ "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/Ibe5f8e25dea155bbd811a65833394c0d4b906a34" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-37305", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-26T16:14:53.884421Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-203", "description": "CWE-203 Observable Discrepancy", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-26T16:16:14.016Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the ProofreadPage (aka Proofread Page) extension for MediaWiki through 1.39.3. In includes/Page/PageContentHandler.php and includes/Page/PageDisplayHandler.php, hidden users can be exposed via public interfaces." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-30T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T326952" }, { "url": "https://gerrit.wikimedia.org/r/q/Ibe5f8e25dea155bbd811a65833394c0d4b906a34" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-37305", "datePublished": "2023-06-30T00:00:00", "dateReserved": "2023-06-30T00:00:00", "dateUpdated": "2024-11-26T16:16:14.016Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2005-3165
Vulnerability from cvelistv5
Published
2005-10-06 04:00
Modified
2024-09-17 01:31
Severity ?
EPSS score ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in MediaWiki before 1.4.9 allow remote attackers to inject arbitrary web script or HTML via (1) <math> tags or (2) Extension or <nowiki> sections that "bypass HTML style attribute restrictions" that are intended to protect against XSS vulnerabilities in Internet Explorer clients.
References
▼ | URL | Tags |
---|---|---|
http://sourceforge.net/project/shownotes.php?release_id=352777 | x_refsource_CONFIRM | |
http://secunia.com/advisories/16932 | third-party-advisory, x_refsource_SECUNIA | |
http://lwn.net/Articles/153906/ | vendor-advisory, x_refsource_SUSE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T23:01:59.293Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sourceforge.net/project/shownotes.php?release_id=352777" }, { "name": "16932", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/16932" }, { "name": "SUSE-SR:2005:021", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lwn.net/Articles/153906/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in MediaWiki before 1.4.9 allow remote attackers to inject arbitrary web script or HTML via (1) \u003cmath\u003e tags or (2) Extension or \u003cnowiki\u003e sections that \"bypass HTML style attribute restrictions\" that are intended to protect against XSS vulnerabilities in Internet Explorer clients." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-10-06T04:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sourceforge.net/project/shownotes.php?release_id=352777" }, { "name": "16932", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/16932" }, { "name": "SUSE-SR:2005:021", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lwn.net/Articles/153906/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-3165", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in MediaWiki before 1.4.9 allow remote attackers to inject arbitrary web script or HTML via (1) \u003cmath\u003e tags or (2) Extension or \u003cnowiki\u003e sections that \"bypass HTML style attribute restrictions\" that are intended to protect against XSS vulnerabilities in Internet Explorer clients." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://sourceforge.net/project/shownotes.php?release_id=352777", "refsource": "CONFIRM", "url": "http://sourceforge.net/project/shownotes.php?release_id=352777" }, { "name": "16932", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/16932" }, { "name": "SUSE-SR:2005:021", "refsource": "SUSE", "url": "http://lwn.net/Articles/153906/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-3165", "datePublished": "2005-10-06T04:00:00Z", "dateReserved": "2005-10-06T00:00:00Z", "dateUpdated": "2024-09-17T01:31:24.015Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-8008
Vulnerability from cvelistv5
Published
2017-12-29 22:00
Modified
2024-08-06 08:06
Severity ?
EPSS score ?
Summary
The OAuth extension for MediaWiki improperly negotiates a new client token only over Special:OAuth/initiate, which allows attackers to bypass intended IP address access restrictions by making an API request with an existing token.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/77379 | vdb-entry, x_refsource_BID | |
https://bugzilla.redhat.com/show_bug.cgi?id=1273353 | x_refsource_CONFIRM | |
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/170979.html | vendor-advisory, x_refsource_FEDORA | |
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/170961.html | vendor-advisory, x_refsource_FEDORA | |
http://www.securitytracker.com/id/1034028 | vdb-entry, x_refsource_SECTRACK | |
https://phabricator.wikimedia.org/T103022 | x_refsource_CONFIRM | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-October/000182.html | mailing-list, x_refsource_MLIST | |
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171007.html | vendor-advisory, x_refsource_FEDORA | |
http://www.openwall.com/lists/oss-security/2015/10/29/14 | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:06:31.575Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "77379", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/77379" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273353" }, { "name": "FEDORA-2015-ec6d598d3d", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/170979.html" }, { "name": "FEDORA-2015-97fe05f788", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/170961.html" }, { "name": "1034028", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1034028" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T103022" }, { "name": "[MediaWiki-announce] 20151016 Extension Security Release: OAuth, Echo, PageTriage", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-October/000182.html" }, { "name": "FEDORA-2015-24fe8b66c9", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171007.html" }, { "name": "[oss-security] 20151029 Re: CVE Request: MediaWiki 1.25.3, 1.24.4 and 1.23.11", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/10/29/14" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-10-16T00:00:00", "descriptions": [ { "lang": "en", "value": "The OAuth extension for MediaWiki improperly negotiates a new client token only over Special:OAuth/initiate, which allows attackers to bypass intended IP address access restrictions by making an API request with an existing token." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-29T21:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "77379", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/77379" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273353" }, { "name": "FEDORA-2015-ec6d598d3d", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/170979.html" }, { "name": "FEDORA-2015-97fe05f788", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/170961.html" }, { "name": "1034028", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1034028" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T103022" }, { "name": "[MediaWiki-announce] 20151016 Extension Security Release: OAuth, Echo, PageTriage", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-October/000182.html" }, { "name": "FEDORA-2015-24fe8b66c9", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171007.html" }, { "name": "[oss-security] 20151029 Re: CVE Request: MediaWiki 1.25.3, 1.24.4 and 1.23.11", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/10/29/14" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-8008", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The OAuth extension for MediaWiki improperly negotiates a new client token only over Special:OAuth/initiate, which allows attackers to bypass intended IP address access restrictions by making an API request with an existing token." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "77379", "refsource": "BID", "url": "http://www.securityfocus.com/bid/77379" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1273353", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273353" }, { "name": "FEDORA-2015-ec6d598d3d", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/170979.html" }, { "name": "FEDORA-2015-97fe05f788", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/170961.html" }, { "name": "1034028", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034028" }, { "name": "https://phabricator.wikimedia.org/T103022", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T103022" }, { "name": "[MediaWiki-announce] 20151016 Extension Security Release: OAuth, Echo, PageTriage", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-October/000182.html" }, { "name": "FEDORA-2015-24fe8b66c9", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171007.html" }, { "name": "[oss-security] 20151029 Re: CVE Request: MediaWiki 1.25.3, 1.24.4 and 1.23.11", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/10/29/14" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-8008", "datePublished": "2017-12-29T22:00:00", "dateReserved": "2015-10-28T00:00:00", "dateUpdated": "2024-08-06T08:06:31.575Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-51704
Vulnerability from cvelistv5
Published
2023-12-22 00:00
Modified
2024-09-26 15:03
Severity ?
EPSS score ?
Summary
An issue was discovered in MediaWiki before 1.35.14, 1.36.x through 1.39.x before 1.39.6, and 1.40.x before 1.40.2. In includes/logging/RightsLogFormatter.php, group-*-member messages can result in XSS on Special:log/rights.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-09-26T15:03:05.216Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T347726" }, { "name": "[debian-lts-announce] 20240427 [SECURITY] [DLA 3796-1] mediawiki security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00018.html" }, { "name": "FEDORA-2024-2c564b942d", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FU2FGUXXK6TMV6R52VRECLC6XCSQQISY/" }, { "url": "https://lists.debian.org/debian-lts-announce/2024/09/msg00039.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MediaWiki before 1.35.14, 1.36.x through 1.39.x before 1.39.6, and 1.40.x before 1.40.2. In includes/logging/RightsLogFormatter.php, group-*-member messages can result in XSS on Special:log/rights." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-10T16:13:42.739051", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T347726" }, { "name": "[debian-lts-announce] 20240427 [SECURITY] [DLA 3796-1] mediawiki security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00018.html" }, { "name": "FEDORA-2024-2c564b942d", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FU2FGUXXK6TMV6R52VRECLC6XCSQQISY/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-51704", "datePublished": "2023-12-22T00:00:00", "dateReserved": "2023-12-22T00:00:00", "dateUpdated": "2024-09-26T15:03:05.216Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-0177
Vulnerability from cvelistv5
Published
2007-01-11 00:00
Modified
2024-08-07 12:12
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in the AJAX module in MediaWiki before 1.6.9, 1.7 before 1.7.2, 1.8 before 1.8.3, and 1.9 before 1.9.0rc2, when wgUseAjax is enabled, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T12:12:17.283Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2007-0096", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/0096" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_7_2/phase3/RELEASE-NOTES" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_6_9/phase3/RELEASE-NOTES" }, { "name": "24889", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24889" }, { "name": "mediawiki-ajax-unspecified-xss(31359)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31359" }, { "name": "SUSE-SR:2007:006", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2007_6_sr.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_8_3/phase3/RELEASE-NOTES" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_9_0RC2/phase3/RELEASE-NOTES" }, { "name": "31525", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/31525" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sourceforge.net/forum/forum.php?forum_id=652721" }, { "name": "21956", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/21956" }, { "name": "23647", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/23647" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-01-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the AJAX module in MediaWiki before 1.6.9, 1.7 before 1.7.2, 1.8 before 1.8.3, and 1.9 before 1.9.0rc2, when wgUseAjax is enabled, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2007-0096", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/0096" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_7_2/phase3/RELEASE-NOTES" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_6_9/phase3/RELEASE-NOTES" }, { "name": "24889", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24889" }, { "name": "mediawiki-ajax-unspecified-xss(31359)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31359" }, { "name": "SUSE-SR:2007:006", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2007_6_sr.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_8_3/phase3/RELEASE-NOTES" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_9_0RC2/phase3/RELEASE-NOTES" }, { "name": "31525", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/31525" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sourceforge.net/forum/forum.php?forum_id=652721" }, { "name": "21956", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/21956" }, { "name": "23647", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/23647" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-0177", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the AJAX module in MediaWiki before 1.6.9, 1.7 before 1.7.2, 1.8 before 1.8.3, and 1.9 before 1.9.0rc2, when wgUseAjax is enabled, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2007-0096", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/0096" }, { "name": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_7_2/phase3/RELEASE-NOTES", "refsource": "CONFIRM", "url": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_7_2/phase3/RELEASE-NOTES" }, { "name": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_6_9/phase3/RELEASE-NOTES", "refsource": "CONFIRM", "url": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_6_9/phase3/RELEASE-NOTES" }, { "name": "24889", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24889" }, { "name": "mediawiki-ajax-unspecified-xss(31359)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31359" }, { "name": "SUSE-SR:2007:006", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2007_6_sr.html" }, { "name": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_8_3/phase3/RELEASE-NOTES", "refsource": "CONFIRM", "url": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_8_3/phase3/RELEASE-NOTES" }, { "name": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_9_0RC2/phase3/RELEASE-NOTES", "refsource": "CONFIRM", "url": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_9_0RC2/phase3/RELEASE-NOTES" }, { "name": "31525", "refsource": "OSVDB", "url": "http://osvdb.org/31525" }, { "name": "http://sourceforge.net/forum/forum.php?forum_id=652721", "refsource": "CONFIRM", "url": "http://sourceforge.net/forum/forum.php?forum_id=652721" }, { "name": "21956", "refsource": "BID", "url": "http://www.securityfocus.com/bid/21956" }, { "name": "23647", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/23647" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-0177", "datePublished": "2007-01-11T00:00:00", "dateReserved": "2007-01-10T00:00:00", "dateUpdated": "2024-08-07T12:12:17.283Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-1578
Vulnerability from cvelistv5
Published
2012-09-09 21:00
Modified
2024-08-06 19:01
Severity ?
EPSS score ?
Summary
Multiple cross-site request forgery (CSRF) vulnerabilities in MediaWiki 1.17.x before 1.17.3 and 1.18.x before 1.18.2 allow remote attackers to hijack the authentication of users with the block permission for requests that (1) block a user via a request to the Block module or (2) unblock a user via a request to the Unblock module.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/78911 | vdb-entry, x_refsource_XF | |
http://www.openwall.com/lists/oss-security/2012/03/24/1 | mailing-list, x_refsource_MLIST | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000110.html | mailing-list, x_refsource_MLIST | |
http://secunia.com/advisories/48504 | third-party-advisory, x_refsource_SECUNIA | |
https://bugzilla.wikimedia.org/show_bug.cgi?id=34212 | x_refsource_CONFIRM | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000109.html | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2012/03/22/9 | mailing-list, x_refsource_MLIST | |
http://osvdb.org/80361 | vdb-entry, x_refsource_OSVDB | |
http://www.securityfocus.com/bid/52689 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:01:02.739Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "mediawiki-multiple-csrf(78911)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78911" }, { "name": "[oss-security] 20120323 CVEs for MediaWiki security and maintenance release 1.18.2", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/03/24/1" }, { "name": "[MediaWiki-announce] 20120322 MediaWiki security and maintenance release 1.18.2", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000110.html" }, { "name": "48504", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48504" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=34212" }, { "name": "[MediaWiki-announce] 20120322 MediaWiki security and maintenance release 1.17.3", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000109.html" }, { "name": "[oss-security] 20120322 MediaWiki security and maintenance release 1.18.2", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/03/22/9" }, { "name": "80361", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/80361" }, { "name": "52689", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/52689" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-03-22T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in MediaWiki 1.17.x before 1.17.3 and 1.18.x before 1.18.2 allow remote attackers to hijack the authentication of users with the block permission for requests that (1) block a user via a request to the Block module or (2) unblock a user via a request to the Unblock module." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "mediawiki-multiple-csrf(78911)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78911" }, { "name": "[oss-security] 20120323 CVEs for MediaWiki security and maintenance release 1.18.2", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/03/24/1" }, { "name": "[MediaWiki-announce] 20120322 MediaWiki security and maintenance release 1.18.2", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000110.html" }, { "name": "48504", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48504" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=34212" }, { "name": "[MediaWiki-announce] 20120322 MediaWiki security and maintenance release 1.17.3", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000109.html" }, { "name": "[oss-security] 20120322 MediaWiki security and maintenance release 1.18.2", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/03/22/9" }, { "name": "80361", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/80361" }, { "name": "52689", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/52689" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-1578", "datePublished": "2012-09-09T21:00:00", "dateReserved": "2012-03-12T00:00:00", "dateUpdated": "2024-08-06T19:01:02.739Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34911
Vulnerability from cvelistv5
Published
2022-07-02 00:00
Modified
2024-08-03 09:22
Severity ?
EPSS score ?
Summary
An issue was discovered in MediaWiki before 1.35.7, 1.36.x and 1.37.x before 1.37.3, and 1.38.x before 1.38.1. XSS can occur in configurations that allow a JavaScript payload in a username. After account creation, when it sets the page title to "Welcome" followed by the username, the username is not escaped: SpecialCreateAccount::successfulAction() calls ::showSuccessPage() with a message as second parameter, and OutputPage::setPageTitle() uses text().
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:22:10.647Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T308471" }, { "name": "FEDORA-2022-f83aec6d57", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7N5ZBWLNNPZKFK7Q4KEHGCJ2YELQEUJP/" }, { "name": "FEDORA-2022-bca2c95559", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKKOQXPYLMBSEVDHFS32BPBR3ZQJKY5B/" }, { "name": "[debian-lts-announce] 20220922 [SECURITY] [DLA 3117-1] mediawiki security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00027.html" }, { "name": "DSA-5246", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2022/dsa-5246" }, { "name": "GLSA-202305-24", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202305-24" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MediaWiki before 1.35.7, 1.36.x and 1.37.x before 1.37.3, and 1.38.x before 1.38.1. XSS can occur in configurations that allow a JavaScript payload in a username. After account creation, when it sets the page title to \"Welcome\" followed by the username, the username is not escaped: SpecialCreateAccount::successfulAction() calls ::showSuccessPage() with a message as second parameter, and OutputPage::setPageTitle() uses text()." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-21T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T308471" }, { "name": "FEDORA-2022-f83aec6d57", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7N5ZBWLNNPZKFK7Q4KEHGCJ2YELQEUJP/" }, { "name": "FEDORA-2022-bca2c95559", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKKOQXPYLMBSEVDHFS32BPBR3ZQJKY5B/" }, { "name": "[debian-lts-announce] 20220922 [SECURITY] [DLA 3117-1] mediawiki security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00027.html" }, { "name": "DSA-5246", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2022/dsa-5246" }, { "name": "GLSA-202305-24", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202305-24" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-34911", "datePublished": "2022-07-02T00:00:00", "dateReserved": "2022-07-02T00:00:00", "dateUpdated": "2024-08-03T09:22:10.647Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-5391
Vulnerability from cvelistv5
Published
2014-06-02 15:00
Modified
2024-08-06 21:05
Severity ?
EPSS score ?
Summary
Session fixation vulnerability in Special:UserLogin in MediaWiki before 1.18.6, 1.19.x before 1.19.3, and 1.20.x before 1.20.1 allows remote attackers to hijack web sessions via the session_id.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/83008 | vdb-entry, x_refsource_XF | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-November/000122.html | mailing-list, x_refsource_MLIST | |
http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100843.html | vendor-advisory, x_refsource_FEDORA | |
http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100845.html | vendor-advisory, x_refsource_FEDORA | |
http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098975.html | vendor-advisory, x_refsource_FEDORA | |
https://bugzilla.wikimedia.org/show_bug.cgi?id=40995 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:05:47.225Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "mediawiki-cve20125391-session-hijacking(83008)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83008" }, { "name": "[MediaWiki-announce] 20121130 MediaWiki security release: 1.20.1, 1.19.3 and 1.18.6", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-November/000122.html" }, { "name": "FEDORA-2013-3227", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100843.html" }, { "name": "FEDORA-2013-3265", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100845.html" }, { "name": "FEDORA-2013-2090", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098975.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=40995" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-10-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Session fixation vulnerability in Special:UserLogin in MediaWiki before 1.18.6, 1.19.x before 1.19.3, and 1.20.x before 1.20.1 allows remote attackers to hijack web sessions via the session_id." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "mediawiki-cve20125391-session-hijacking(83008)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83008" }, { "name": "[MediaWiki-announce] 20121130 MediaWiki security release: 1.20.1, 1.19.3 and 1.18.6", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-November/000122.html" }, { "name": "FEDORA-2013-3227", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100843.html" }, { "name": "FEDORA-2013-3265", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100845.html" }, { "name": "FEDORA-2013-2090", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098975.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=40995" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-5391", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Session fixation vulnerability in Special:UserLogin in MediaWiki before 1.18.6, 1.19.x before 1.19.3, and 1.20.x before 1.20.1 allows remote attackers to hijack web sessions via the session_id." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "mediawiki-cve20125391-session-hijacking(83008)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83008" }, { "name": "[MediaWiki-announce] 20121130 MediaWiki security release: 1.20.1, 1.19.3 and 1.18.6", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-November/000122.html" }, { "name": "FEDORA-2013-3227", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100843.html" }, { "name": "FEDORA-2013-3265", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100845.html" }, { "name": "FEDORA-2013-2090", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098975.html" }, { "name": "https://bugzilla.wikimedia.org/show_bug.cgi?id=40995", "refsource": "CONFIRM", "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=40995" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-5391", "datePublished": "2014-06-02T15:00:00", "dateReserved": "2012-10-17T00:00:00", "dateUpdated": "2024-08-06T21:05:47.225Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-12468
Vulnerability from cvelistv5
Published
2019-07-10 14:58
Modified
2024-08-04 23:24
Severity ?
EPSS score ?
Summary
An Incorrect Access Control vulnerability was found in Wikimedia MediaWiki 1.27.0 through 1.32.1. Directly POSTing to Special:ChangeEmail would allow for bypassing re-authentication, allowing for potential account takeover.
References
▼ | URL | Tags |
---|---|---|
https://lists.wikimedia.org/pipermail/mediawiki-announce/ | x_refsource_MISC | |
https://www.debian.org/security/2019/dsa-4460 | vendor-advisory, x_refsource_DEBIAN | |
https://seclists.org/bugtraq/2019/Jun/12 | mailing-list, x_refsource_BUGTRAQ | |
https://phabricator.wikimedia.org/T197279 | x_refsource_MISC | |
https://lists.wikimedia.org/pipermail/wikitech-l/2019-June/092152.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:24:37.085Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/" }, { "name": "DSA-4460", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2019/dsa-4460" }, { "name": "20190612 [SECURITY] [DSA 4460-1] mediawiki security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Jun/12" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T197279" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2019-June/092152.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An Incorrect Access Control vulnerability was found in Wikimedia MediaWiki 1.27.0 through 1.32.1. Directly POSTing to Special:ChangeEmail would allow for bypassing re-authentication, allowing for potential account takeover." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-07-10T14:58:58", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/" }, { "name": "DSA-4460", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2019/dsa-4460" }, { "name": "20190612 [SECURITY] [DSA 4460-1] mediawiki security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Jun/12" }, { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T197279" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2019-June/092152.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-12468", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An Incorrect Access Control vulnerability was found in Wikimedia MediaWiki 1.27.0 through 1.32.1. Directly POSTing to Special:ChangeEmail would allow for bypassing re-authentication, allowing for potential account takeover." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://lists.wikimedia.org/pipermail/mediawiki-announce/", "refsource": "MISC", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/" }, { "name": "DSA-4460", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2019/dsa-4460" }, { "name": "20190612 [SECURITY] [DSA 4460-1] mediawiki security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Jun/12" }, { "name": "https://phabricator.wikimedia.org/T197279", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T197279" }, { "name": "https://lists.wikimedia.org/pipermail/wikitech-l/2019-June/092152.html", "refsource": "CONFIRM", "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2019-June/092152.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-12468", "datePublished": "2019-07-10T14:58:15", "dateReserved": "2019-05-30T00:00:00", "dateUpdated": "2024-08-04T23:24:37.085Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-10959
Vulnerability from cvelistv5
Published
2020-06-02 13:52
Modified
2024-08-04 11:21
Severity ?
EPSS score ?
Summary
resources/src/mediawiki.page.ready/ready.js in MediaWiki before 1.35 allows remote attackers to force a logout and external redirection via HTML content in a MediaWiki page.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T232932 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/c/mediawiki/core/+/536725 | x_refsource_MISC | |
https://phabricator.wikimedia.org/T240393 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:21:14.656Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T232932" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/c/mediawiki/core/+/536725" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T240393" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "resources/src/mediawiki.page.ready/ready.js in MediaWiki before 1.35 allows remote attackers to force a logout and external redirection via HTML content in a MediaWiki page." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-02T13:52:22", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T232932" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/c/mediawiki/core/+/536725" }, { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T240393" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-10959", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "resources/src/mediawiki.page.ready/ready.js in MediaWiki before 1.35 allows remote attackers to force a logout and external redirection via HTML content in a MediaWiki page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T232932", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T232932" }, { "name": "https://gerrit.wikimedia.org/r/c/mediawiki/core/+/536725", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/c/mediawiki/core/+/536725" }, { "name": "https://phabricator.wikimedia.org/T240393", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T240393" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-10959", "datePublished": "2020-06-02T13:52:22", "dateReserved": "2020-03-25T00:00:00", "dateUpdated": "2024-08-04T11:21:14.656Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-41799
Vulnerability from cvelistv5
Published
2021-10-11 00:00
Modified
2024-08-04 03:22
Severity ?
EPSS score ?
Summary
MediaWiki before 1.36.2 allows a denial of service (resource consumption because of lengthy query processing time). ApiQueryBacklinks (action=query&list=backlinks) can cause a full table scan.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:22:24.073Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T290394" }, { "tags": [ "x_transferred" ], "url": "https://lists.wikimedia.org/hyperkitty/list/wikitech-l%40lists.wikimedia.org/thread/2IFS5CM2YV4VMSODPX3J2LFHKSEWVFV5/" }, { "name": "FEDORA-2021-eee8b7514f", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QNEAI2T3Y65I55ZB6UE6RMC662RZTGRX/" }, { "name": "FEDORA-2021-56d8173b5e", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CJDYJQWT43GBD6GNQ4OW7JOZ6WQ6DZTN/" }, { "name": "FEDORA-2021-3dd1b66cbf", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MDBPECBWN6LWNSWIQMVXK6PP4YFEUYHA/" }, { "name": "GLSA-202305-24", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202305-24" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "MediaWiki before 1.36.2 allows a denial of service (resource consumption because of lengthy query processing time). ApiQueryBacklinks (action=query\u0026list=backlinks) can cause a full table scan." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-21T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T290394" }, { "url": "https://lists.wikimedia.org/hyperkitty/list/wikitech-l%40lists.wikimedia.org/thread/2IFS5CM2YV4VMSODPX3J2LFHKSEWVFV5/" }, { "name": "FEDORA-2021-eee8b7514f", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QNEAI2T3Y65I55ZB6UE6RMC662RZTGRX/" }, { "name": "FEDORA-2021-56d8173b5e", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CJDYJQWT43GBD6GNQ4OW7JOZ6WQ6DZTN/" }, { "name": "FEDORA-2021-3dd1b66cbf", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MDBPECBWN6LWNSWIQMVXK6PP4YFEUYHA/" }, { "name": "GLSA-202305-24", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202305-24" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-41799", "datePublished": "2021-10-11T00:00:00", "dateReserved": "2021-09-29T00:00:00", "dateUpdated": "2024-08-04T03:22:24.073Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-27621
Vulnerability from cvelistv5
Published
2020-10-22 03:04
Modified
2024-08-04 16:18
Severity ?
EPSS score ?
Summary
The FileImporter extension in MediaWiki through 1.35.0 was not properly attributing various user actions to a specific user's IP address. Instead, for various actions, it would report the IP address of an internal Wikimedia Foundation server by omitting X-Forwarded-For data. This resulted in an inability to properly audit and attribute various user actions performed via the FileImporter extension.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T265810 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/I24a240253c7a5c66dd493a68e8c23d95a17e1b21 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:18:44.821Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T265810" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/I24a240253c7a5c66dd493a68e8c23d95a17e1b21" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The FileImporter extension in MediaWiki through 1.35.0 was not properly attributing various user actions to a specific user\u0027s IP address. Instead, for various actions, it would report the IP address of an internal Wikimedia Foundation server by omitting X-Forwarded-For data. This resulted in an inability to properly audit and attribute various user actions performed via the FileImporter extension." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-22T03:04:57", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T265810" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/I24a240253c7a5c66dd493a68e8c23d95a17e1b21" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-27621", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The FileImporter extension in MediaWiki through 1.35.0 was not properly attributing various user actions to a specific user\u0027s IP address. Instead, for various actions, it would report the IP address of an internal Wikimedia Foundation server by omitting X-Forwarded-For data. This resulted in an inability to properly audit and attribute various user actions performed via the FileImporter extension." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T265810", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T265810" }, { "name": "https://gerrit.wikimedia.org/r/q/I24a240253c7a5c66dd493a68e8c23d95a17e1b21", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/I24a240253c7a5c66dd493a68e8c23d95a17e1b21" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-27621", "datePublished": "2020-10-22T03:04:57", "dateReserved": "2020-10-22T00:00:00", "dateUpdated": "2024-08-04T16:18:44.821Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-8625
Vulnerability from cvelistv5
Published
2017-03-23 20:00
Modified
2024-08-06 08:20
Severity ?
EPSS score ?
Summary
MediaWiki before 1.23.12, 1.24.x before 1.24.5, 1.25.x before 1.25.4, and 1.26.x before 1.26.1 do not properly sanitize parameters when calling the cURL library, which allows remote attackers to read arbitrary files via an @ (at sign) character in unspecified POST array parameters.
References
▼ | URL | Tags |
---|---|---|
https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-December/000186.html | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2015/12/23/7 | mailing-list, x_refsource_MLIST | |
https://phabricator.wikimedia.org/T118032 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2015/12/21/8 | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:20:43.531Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[MediaWiki-announce] 20151221 [MediaWiki-announce] Security Release: 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-December/000186.html" }, { "name": "[oss-security] 20151223 Re: CVE requests for MediaWiki 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/12/23/7" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T118032" }, { "name": "[oss-security] 20151221 CVE requests for MediaWiki 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/12/21/8" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-12-21T00:00:00", "descriptions": [ { "lang": "en", "value": "MediaWiki before 1.23.12, 1.24.x before 1.24.5, 1.25.x before 1.25.4, and 1.26.x before 1.26.1 do not properly sanitize parameters when calling the cURL library, which allows remote attackers to read arbitrary files via an @ (at sign) character in unspecified POST array parameters." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-03-23T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[MediaWiki-announce] 20151221 [MediaWiki-announce] Security Release: 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-December/000186.html" }, { "name": "[oss-security] 20151223 Re: CVE requests for MediaWiki 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/12/23/7" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T118032" }, { "name": "[oss-security] 20151221 CVE requests for MediaWiki 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/12/21/8" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-8625", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MediaWiki before 1.23.12, 1.24.x before 1.24.5, 1.25.x before 1.25.4, and 1.26.x before 1.26.1 do not properly sanitize parameters when calling the cURL library, which allows remote attackers to read arbitrary files via an @ (at sign) character in unspecified POST array parameters." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[MediaWiki-announce] 20151221 [MediaWiki-announce] Security Release: 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-December/000186.html" }, { "name": "[oss-security] 20151223 Re: CVE requests for MediaWiki 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/12/23/7" }, { "name": "https://phabricator.wikimedia.org/T118032", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T118032" }, { "name": "[oss-security] 20151221 CVE requests for MediaWiki 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/12/21/8" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-8625", "datePublished": "2017-03-23T20:00:00", "dateReserved": "2015-12-23T00:00:00", "dateUpdated": "2024-08-06T08:20:43.531Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-37302
Vulnerability from cvelistv5
Published
2023-06-30 00:00
Modified
2024-11-26 16:44
Severity ?
EPSS score ?
Summary
An issue was discovered in SiteLinksView.php in Wikibase in MediaWiki through 1.39.3. There is XSS via a crafted badge title attribute. This is also related to lack of escaping in wbTemplate (from resources/wikibase/templates.js) for quotes (which can be in a title attribute).
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:09:34.000Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T339111" }, { "tags": [ "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Wikibase/+/933649" }, { "tags": [ "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Wikibase/+/933650" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-37302", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-26T16:44:40.558042Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-26T16:44:49.293Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in SiteLinksView.php in Wikibase in MediaWiki through 1.39.3. There is XSS via a crafted badge title attribute. This is also related to lack of escaping in wbTemplate (from resources/wikibase/templates.js) for quotes (which can be in a title attribute)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-30T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T339111" }, { "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Wikibase/+/933649" }, { "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Wikibase/+/933650" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-37302", "datePublished": "2023-06-30T00:00:00", "dateReserved": "2023-06-30T00:00:00", "dateUpdated": "2024-11-26T16:44:49.293Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-40596
Vulnerability from cvelistv5
Published
2024-07-06 00:00
Modified
2024-08-02 04:33
Severity ?
EPSS score ?
Summary
An issue was discovered in the CheckUser extension for MediaWiki through 1.42.1. The Special:Investigate feature can expose suppressed information for log events. (TimelineService does not support properly suppressing.)
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-40596", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-08T13:45:32.457314Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-08T13:45:52.034Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T04:33:11.679Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T326866" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the CheckUser extension for MediaWiki through 1.42.1. The Special:Investigate feature can expose suppressed information for log events. (TimelineService does not support properly suppressing.)" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-06T23:25:55.994340", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T326866" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-40596", "datePublished": "2024-07-06T00:00:00", "dateReserved": "2024-07-06T00:00:00", "dateUpdated": "2024-08-02T04:33:11.679Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-31549
Vulnerability from cvelistv5
Published
2021-04-22 02:30
Modified
2024-08-03 23:03
Severity ?
EPSS score ?
Summary
An issue was discovered in the AbuseFilter extension for MediaWiki through 1.35.2. The Special:AbuseFilter/examine form allowed for the disclosure of suppressed MediaWiki usernames to unprivileged users.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T274152 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/I6063c02fa261c4cc0e6dbbb2db4e111eb85912c2 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/I71a6d521bd12931ce60eec4d2dc35af19146000f | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:03:33.235Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T274152" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/I6063c02fa261c4cc0e6dbbb2db4e111eb85912c2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/I71a6d521bd12931ce60eec4d2dc35af19146000f" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the AbuseFilter extension for MediaWiki through 1.35.2. The Special:AbuseFilter/examine form allowed for the disclosure of suppressed MediaWiki usernames to unprivileged users." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-22T02:30:10", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T274152" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/I6063c02fa261c4cc0e6dbbb2db4e111eb85912c2" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/I71a6d521bd12931ce60eec4d2dc35af19146000f" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-31549", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in the AbuseFilter extension for MediaWiki through 1.35.2. The Special:AbuseFilter/examine form allowed for the disclosure of suppressed MediaWiki usernames to unprivileged users." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T274152", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T274152" }, { "name": "https://gerrit.wikimedia.org/r/q/I6063c02fa261c4cc0e6dbbb2db4e111eb85912c2", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/I6063c02fa261c4cc0e6dbbb2db4e111eb85912c2" }, { "name": "https://gerrit.wikimedia.org/r/q/I71a6d521bd12931ce60eec4d2dc35af19146000f", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/I71a6d521bd12931ce60eec4d2dc35af19146000f" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-31549", "datePublished": "2021-04-22T02:30:10", "dateReserved": "2021-04-22T00:00:00", "dateUpdated": "2024-08-03T23:03:33.235Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-19709
Vulnerability from cvelistv5
Published
2019-12-11 01:33
Modified
2024-08-05 02:25
Severity ?
EPSS score ?
Summary
MediaWiki through 1.33.1 allows attackers to bypass the Title_blacklist protection mechanism by starting with an arbitrary title, establishing a non-resolvable redirect for the associated page, and using redirect=1 in the action API when editing that page.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T239466 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/Ie54f366986056c876eade0fcad6c41f70b8b8de8 | x_refsource_MISC | |
https://www.debian.org/security/2019/dsa-4592 | vendor-advisory, x_refsource_DEBIAN | |
https://seclists.org/bugtraq/2019/Dec/48 | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T02:25:12.120Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T239466" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/Ie54f366986056c876eade0fcad6c41f70b8b8de8" }, { "name": "DSA-4592", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2019/dsa-4592" }, { "name": "20191229 [SECURITY] [DSA 4592-1] mediawiki security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Dec/48" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "MediaWiki through 1.33.1 allows attackers to bypass the Title_blacklist protection mechanism by starting with an arbitrary title, establishing a non-resolvable redirect for the associated page, and using redirect=1 in the action API when editing that page." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-12-30T09:06:04", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T239466" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/Ie54f366986056c876eade0fcad6c41f70b8b8de8" }, { "name": "DSA-4592", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2019/dsa-4592" }, { "name": "20191229 [SECURITY] [DSA 4592-1] mediawiki security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Dec/48" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-19709", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MediaWiki through 1.33.1 allows attackers to bypass the Title_blacklist protection mechanism by starting with an arbitrary title, establishing a non-resolvable redirect for the associated page, and using redirect=1 in the action API when editing that page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T239466", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T239466" }, { "name": "https://gerrit.wikimedia.org/r/q/Ie54f366986056c876eade0fcad6c41f70b8b8de8", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/Ie54f366986056c876eade0fcad6c41f70b8b8de8" }, { "name": "DSA-4592", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2019/dsa-4592" }, { "name": "20191229 [SECURITY] [DSA 4592-1] mediawiki security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Dec/48" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-19709", "datePublished": "2019-12-11T01:33:11", "dateReserved": "2019-12-11T00:00:00", "dateUpdated": "2024-08-05T02:25:12.120Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-9480
Vulnerability from cvelistv5
Published
2015-01-16 16:00
Modified
2024-08-06 13:47
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in the Hovercards extension for MediaWiki allows remote attackers to inject arbitrary web script or HTML via vectors related to text extracts.
References
▼ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2015/01/03/13 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2014/12/21/2 | mailing-list, x_refsource_MLIST | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-December/000173.html | mailing-list, x_refsource_MLIST | |
https://phabricator.wikimedia.org/T69180 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:47:41.057Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20150103 Re: CVE Request: Mediawiki security releases 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/01/03/13" }, { "name": "[oss-security] 20141221 CVE Request: Mediawiki security releases 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/12/21/2" }, { "name": "[MediaWiki-announce] 20141217 MediaWiki Security and Maintenance Releases: 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-December/000173.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T69180" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-12-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the Hovercards extension for MediaWiki allows remote attackers to inject arbitrary web script or HTML via vectors related to text extracts." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-01-16T15:57:01", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "name": "[oss-security] 20150103 Re: CVE Request: Mediawiki security releases 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/01/03/13" }, { "name": "[oss-security] 20141221 CVE Request: Mediawiki security releases 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/12/21/2" }, { "name": "[MediaWiki-announce] 20141217 MediaWiki Security and Maintenance Releases: 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-December/000173.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T69180" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "ID": "CVE-2014-9480", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the Hovercards extension for MediaWiki allows remote attackers to inject arbitrary web script or HTML via vectors related to text extracts." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20150103 Re: CVE Request: Mediawiki security releases 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/01/03/13" }, { "name": "[oss-security] 20141221 CVE Request: Mediawiki security releases 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/12/21/2" }, { "name": "[MediaWiki-announce] 20141217 MediaWiki Security and Maintenance Releases: 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-December/000173.html" }, { "name": "https://phabricator.wikimedia.org/T69180", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T69180" } ] } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2014-9480", "datePublished": "2015-01-16T16:00:00", "dateReserved": "2015-01-03T00:00:00", "dateUpdated": "2024-08-06T13:47:41.057Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-31545
Vulnerability from cvelistv5
Published
2021-04-22 02:30
Modified
2024-08-03 23:03
Severity ?
EPSS score ?
Summary
An issue was discovered in the AbuseFilter extension for MediaWiki through 1.35.2. The page_recent_contributors leaked the existence of certain deleted MediaWiki usernames, related to rev_deleted.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T71367 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/I8d5ed9ca84282ee50832035af86123633fc88293 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:03:33.417Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T71367" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/I8d5ed9ca84282ee50832035af86123633fc88293" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the AbuseFilter extension for MediaWiki through 1.35.2. The page_recent_contributors leaked the existence of certain deleted MediaWiki usernames, related to rev_deleted." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-22T02:30:59", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T71367" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/I8d5ed9ca84282ee50832035af86123633fc88293" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-31545", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in the AbuseFilter extension for MediaWiki through 1.35.2. The page_recent_contributors leaked the existence of certain deleted MediaWiki usernames, related to rev_deleted." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T71367", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T71367" }, { "name": "https://gerrit.wikimedia.org/r/q/I8d5ed9ca84282ee50832035af86123633fc88293", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/I8d5ed9ca84282ee50832035af86123633fc88293" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-31545", "datePublished": "2021-04-22T02:30:59", "dateReserved": "2021-04-22T00:00:00", "dateUpdated": "2024-08-03T23:03:33.417Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-44857
Vulnerability from cvelistv5
Published
2021-12-17 00:00
Modified
2024-08-04 04:32
Severity ?
EPSS score ?
Summary
An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. It is possible to use action=mcrundo followed by action=mcrrestore to replace the content of any arbitrary page (that the user doesn't have edit rights for). This applies to any public wiki, or a private wiki that has at least one page set in $wgWhitelistRead.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:32:13.362Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T297322" }, { "tags": [ "x_transferred" ], "url": "https://www.mediawiki.org/wiki/2021-12_security_release/FAQ" }, { "name": "GLSA-202305-24", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202305-24" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. It is possible to use action=mcrundo followed by action=mcrrestore to replace the content of any arbitrary page (that the user doesn\u0027t have edit rights for). This applies to any public wiki, or a private wiki that has at least one page set in $wgWhitelistRead." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-21T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T297322" }, { "url": "https://www.mediawiki.org/wiki/2021-12_security_release/FAQ" }, { "name": "GLSA-202305-24", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202305-24" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-44857", "datePublished": "2021-12-17T00:00:00", "dateReserved": "2021-12-13T00:00:00", "dateUpdated": "2024-08-04T04:32:13.362Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-6163
Vulnerability from cvelistv5
Published
2020-01-08 01:45
Modified
2024-08-04 08:55
Severity ?
EPSS score ?
Summary
The WikibaseMediaInfo extension 1.35 for MediaWiki allows XSS because of improper template syntax within the PropertySuggestionsWidget template (in the templates/search/PropertySuggestionsWidget.mustache+dom file).
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T240773 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/558203 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T08:55:22.285Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T240773" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/558203" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The WikibaseMediaInfo extension 1.35 for MediaWiki allows XSS because of improper template syntax within the PropertySuggestionsWidget template (in the templates/search/PropertySuggestionsWidget.mustache+dom file)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-01-08T01:45:12", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T240773" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/558203" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-6163", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The WikibaseMediaInfo extension 1.35 for MediaWiki allows XSS because of improper template syntax within the PropertySuggestionsWidget template (in the templates/search/PropertySuggestionsWidget.mustache+dom file)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T240773", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T240773" }, { "name": "https://gerrit.wikimedia.org/r/558203", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/558203" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-6163", "datePublished": "2020-01-08T01:45:12", "dateReserved": "2020-01-08T00:00:00", "dateUpdated": "2024-08-04T08:55:22.285Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-37254
Vulnerability from cvelistv5
Published
2023-06-29 00:00
Modified
2024-11-27 16:24
Severity ?
EPSS score ?
Summary
An issue was discovered in the Cargo extension for MediaWiki through 1.39.3. XSS can occur in Special:CargoQuery via a crafted page item when using the default format.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:09:33.149Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T331065" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-37254", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-27T16:24:14.123245Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-27T16:24:33.619Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the Cargo extension for MediaWiki through 1.39.3. XSS can occur in Special:CargoQuery via a crafted page item when using the default format." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-29T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T331065" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-37254", "datePublished": "2023-06-29T00:00:00", "dateReserved": "2023-06-29T00:00:00", "dateUpdated": "2024-11-27T16:24:33.619Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-29141
Vulnerability from cvelistv5
Published
2023-03-31 00:00
Modified
2024-08-02 14:00
Severity ?
EPSS score ?
Summary
An issue was discovered in MediaWiki before 1.35.10, 1.36.x through 1.38.x before 1.38.6, and 1.39.x before 1.39.3. An auto-block can occur for an untrusted X-Forwarded-For header.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T14:00:15.869Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T285159" }, { "tags": [ "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/plugins/gitiles/mediawiki/core/+/REL1_39/RELEASE-NOTES-1.39" }, { "name": "FEDORA-2023-567baef490", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZGK4NZPIJ5ET2ANRZOUYPCRIB5I64JR7/" }, { "name": "FEDORA-2023-9d6ab5ebf2", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ONWHGOBFD6CQAEGOP5O375XAP2N6RUHT/" }, { "name": "DSA-5447", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5447" }, { "name": "[debian-lts-announce] 20230822 [SECURITY] [DLA 3540-1] mediawiki security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00029.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MediaWiki before 1.35.10, 1.36.x through 1.38.x before 1.38.6, and 1.39.x before 1.39.3. An auto-block can occur for an untrusted X-Forwarded-For header." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-23T00:06:11.437465", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T285159" }, { "url": "https://gerrit.wikimedia.org/r/plugins/gitiles/mediawiki/core/+/REL1_39/RELEASE-NOTES-1.39" }, { "name": "FEDORA-2023-567baef490", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZGK4NZPIJ5ET2ANRZOUYPCRIB5I64JR7/" }, { "name": "FEDORA-2023-9d6ab5ebf2", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ONWHGOBFD6CQAEGOP5O375XAP2N6RUHT/" }, { "name": "DSA-5447", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2023/dsa-5447" }, { "name": "[debian-lts-announce] 20230822 [SECURITY] [DLA 3540-1] mediawiki security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00029.html" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-29141", "datePublished": "2023-03-31T00:00:00", "dateReserved": "2023-03-31T00:00:00", "dateUpdated": "2024-08-02T14:00:15.869Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-41800
Vulnerability from cvelistv5
Published
2021-10-11 00:00
Modified
2024-08-04 03:22
Severity ?
EPSS score ?
Summary
MediaWiki before 1.36.2 allows a denial of service (resource consumption because of lengthy query processing time). Visiting Special:Contributions can sometimes result in a long running SQL query because PoolCounter protection is mishandled.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:22:24.334Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T284419" }, { "tags": [ "x_transferred" ], "url": "https://lists.wikimedia.org/hyperkitty/list/wikitech-l%40lists.wikimedia.org/thread/2IFS5CM2YV4VMSODPX3J2LFHKSEWVFV5/" }, { "tags": [ "x_transferred" ], "url": "https://github.com/wikimedia/mediawiki/commit/781caf83dba90c18349f930bbaaa0e89f003f874" }, { "name": "FEDORA-2021-eee8b7514f", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QNEAI2T3Y65I55ZB6UE6RMC662RZTGRX/" }, { "name": "FEDORA-2021-56d8173b5e", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CJDYJQWT43GBD6GNQ4OW7JOZ6WQ6DZTN/" }, { "name": "FEDORA-2021-3dd1b66cbf", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MDBPECBWN6LWNSWIQMVXK6PP4YFEUYHA/" }, { "name": "GLSA-202305-24", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202305-24" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "MediaWiki before 1.36.2 allows a denial of service (resource consumption because of lengthy query processing time). Visiting Special:Contributions can sometimes result in a long running SQL query because PoolCounter protection is mishandled." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-21T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T284419" }, { "url": "https://lists.wikimedia.org/hyperkitty/list/wikitech-l%40lists.wikimedia.org/thread/2IFS5CM2YV4VMSODPX3J2LFHKSEWVFV5/" }, { "url": "https://github.com/wikimedia/mediawiki/commit/781caf83dba90c18349f930bbaaa0e89f003f874" }, { "name": "FEDORA-2021-eee8b7514f", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QNEAI2T3Y65I55ZB6UE6RMC662RZTGRX/" }, { "name": "FEDORA-2021-56d8173b5e", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CJDYJQWT43GBD6GNQ4OW7JOZ6WQ6DZTN/" }, { "name": "FEDORA-2021-3dd1b66cbf", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MDBPECBWN6LWNSWIQMVXK6PP4YFEUYHA/" }, { "name": "GLSA-202305-24", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202305-24" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-41800", "datePublished": "2021-10-11T00:00:00", "dateReserved": "2021-09-29T00:00:00", "dateUpdated": "2024-08-04T03:22:24.334Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28206
Vulnerability from cvelistv5
Published
2022-03-30 00:00
Modified
2024-08-03 05:48
Severity ?
EPSS score ?
Summary
An issue was discovered in MediaWiki through 1.37.1. ImportPlanValidator.php in the FileImporter extension mishandles the check for edit rights.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:48:37.483Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T294256" }, { "tags": [ "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/I84be9cd3639b8ab0e037a4ec2d3f2f478f0989c5" }, { "name": "GLSA-202305-24", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202305-24" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MediaWiki through 1.37.1. ImportPlanValidator.php in the FileImporter extension mishandles the check for edit rights." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-21T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T294256" }, { "url": "https://gerrit.wikimedia.org/r/q/I84be9cd3639b8ab0e037a4ec2d3f2f478f0989c5" }, { "name": "GLSA-202305-24", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202305-24" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-28206", "datePublished": "2022-03-30T00:00:00", "dateReserved": "2022-03-30T00:00:00", "dateUpdated": "2024-08-03T05:48:37.483Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-42041
Vulnerability from cvelistv5
Published
2021-10-06 20:28
Modified
2024-08-04 03:22
Severity ?
EPSS score ?
Summary
An issue was discovered in CentralAuth in MediaWiki through 1.36.2. The rightsnone MediaWiki message was not being properly sanitized and allowed for the injection and execution of HTML and JavaScript via the setchange log.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T291696 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/I7aeaa6e4de5ccaa5eeb6bf4fb00c96b01d5fea35 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:22:25.626Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T291696" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/I7aeaa6e4de5ccaa5eeb6bf4fb00c96b01d5fea35" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in CentralAuth in MediaWiki through 1.36.2. The rightsnone MediaWiki message was not being properly sanitized and allowed for the injection and execution of HTML and JavaScript via the setchange log." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-06T20:28:43", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T291696" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/I7aeaa6e4de5ccaa5eeb6bf4fb00c96b01d5fea35" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-42041", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in CentralAuth in MediaWiki through 1.36.2. The rightsnone MediaWiki message was not being properly sanitized and allowed for the injection and execution of HTML and JavaScript via the setchange log." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T291696", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T291696" }, { "name": "https://gerrit.wikimedia.org/r/q/I7aeaa6e4de5ccaa5eeb6bf4fb00c96b01d5fea35", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/I7aeaa6e4de5ccaa5eeb6bf4fb00c96b01d5fea35" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-42041", "datePublished": "2021-10-06T20:28:43", "dateReserved": "2021-10-06T00:00:00", "dateUpdated": "2024-08-04T03:22:25.626Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-37303
Vulnerability from cvelistv5
Published
2023-06-30 00:00
Modified
2024-11-27 18:41
Severity ?
EPSS score ?
Summary
An issue was discovered in the CheckUser extension for MediaWiki through 1.39.3. In certain situations, an attempt to block a user fails after a temporary browser hang and a DBQueryDisconnectedError error message.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:09:34.143Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T338276" }, { "tags": [ "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/I10a9273c542576b3f7bb38de68dcd2aa41cfb1b0" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-37303", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-27T18:40:12.630661Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-754", "description": "CWE-754 Improper Check for Unusual or Exceptional Conditions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-27T18:41:36.313Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the CheckUser extension for MediaWiki through 1.39.3. In certain situations, an attempt to block a user fails after a temporary browser hang and a DBQueryDisconnectedError error message." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-30T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T338276" }, { "url": "https://gerrit.wikimedia.org/r/q/I10a9273c542576b3f7bb38de68dcd2aa41cfb1b0" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-37303", "datePublished": "2023-06-30T00:00:00", "dateReserved": "2023-06-30T00:00:00", "dateUpdated": "2024-11-27T18:41:36.313Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-23172
Vulnerability from cvelistv5
Published
2024-01-12 00:00
Modified
2024-11-14 14:43
Severity ?
EPSS score ?
Summary
An issue was discovered in the CheckUser extension in MediaWiki before 1.35.14, 1.36.x through 1.39.x before 1.39.6, and 1.40.x before 1.40.2. XSS can occur via message definitions. e.g., in SpecialCheckUserLog.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T22:59:31.839Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T347708" }, { "tags": [ "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CheckUser/+/989179" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-23172", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-01-18T19:42:28.907446Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-14T14:43:06.609Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the CheckUser extension in MediaWiki before 1.35.14, 1.36.x through 1.39.x before 1.39.6, and 1.40.x before 1.40.2. XSS can occur via message definitions. e.g., in SpecialCheckUserLog." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-12T04:40:05.107190", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T347708" }, { "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CheckUser/+/989179" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-23172", "datePublished": "2024-01-12T00:00:00", "dateReserved": "2024-01-12T00:00:00", "dateUpdated": "2024-11-14T14:43:06.609Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-1578
Vulnerability from cvelistv5
Published
2011-04-27 00:00
Modified
2024-08-06 22:28
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in MediaWiki before 1.16.3, when Internet Explorer 6 or earlier is used, allows remote attackers to inject arbitrary web script or HTML via an uploaded file accessed with a dangerous extension such as .html at the end of the query string, in conjunction with a modified URI path that has a %2E sequence in place of the . (dot) character.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:28:41.929Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "mediawiki-file-extensions-xss(66737)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66737" }, { "name": "FEDORA-2011-5495", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058588.html" }, { "name": "ADV-2011-0978", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0978" }, { "name": "FEDORA-2011-5807", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059235.html" }, { "name": "47354", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/47354" }, { "name": "44142", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44142" }, { "name": "FEDORA-2011-5848", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058910.html" }, { "name": "ADV-2011-1151", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/1151" }, { "name": "DSA-2366", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2366" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=696360" }, { "name": "[mediawiki-announce] 20110412 MediaWiki security release 1.16.3", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-April/000096.html" }, { "name": "ADV-2011-1100", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/1100" }, { "name": "FEDORA-2011-5812", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059232.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=695577" }, { "name": "[oss-security] 20110413 Re: CVE request: mediawiki 1.16.3", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/04/13/15" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=28235" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in MediaWiki before 1.16.3, when Internet Explorer 6 or earlier is used, allows remote attackers to inject arbitrary web script or HTML via an uploaded file accessed with a dangerous extension such as .html at the end of the query string, in conjunction with a modified URI path that has a %2E sequence in place of the . (dot) character." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "mediawiki-file-extensions-xss(66737)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66737" }, { "name": "FEDORA-2011-5495", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058588.html" }, { "name": "ADV-2011-0978", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0978" }, { "name": "FEDORA-2011-5807", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059235.html" }, { "name": "47354", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/47354" }, { "name": "44142", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44142" }, { "name": "FEDORA-2011-5848", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058910.html" }, { "name": "ADV-2011-1151", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/1151" }, { "name": "DSA-2366", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2366" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=696360" }, { "name": "[mediawiki-announce] 20110412 MediaWiki security release 1.16.3", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-April/000096.html" }, { "name": "ADV-2011-1100", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/1100" }, { "name": "FEDORA-2011-5812", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059232.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=695577" }, { "name": "[oss-security] 20110413 Re: CVE request: mediawiki 1.16.3", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/04/13/15" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=28235" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-1578", "datePublished": "2011-04-27T00:00:00", "dateReserved": "2011-04-05T00:00:00", "dateUpdated": "2024-08-06T22:28:41.929Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-0364
Vulnerability from cvelistv5
Published
2018-04-13 16:00
Modified
2024-09-16 18:29
Severity ?
EPSS score ?
Summary
Mediawiki before 1.28.1 / 1.27.2 / 1.23.16 contains a flaw where Special:Search allows redirects to any interwiki link.
References
▼ | URL | Tags |
---|---|---|
https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html | mailing-list, x_refsource_MLIST | |
https://security-tracker.debian.org/tracker/CVE-2017-0364 | x_refsource_CONFIRM | |
https://phabricator.wikimedia.org/T122209 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T13:03:56.801Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[mediawiki-announce] 20170406 Security Release: 1.28.1 / 1.27.2 / 1.23.16", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security-tracker.debian.org/tracker/CVE-2017-0364" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T122209" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "mediawiki", "vendor": "mediawiki", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-04-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Mediawiki before 1.28.1 / 1.27.2 / 1.23.16 contains a flaw where Special:Search allows redirects to any interwiki link." } ], "problemTypes": [ { "descriptions": [ { "description": "rediretion to any interwiki link", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-04-13T15:57:01", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "name": "[mediawiki-announce] 20170406 Security Release: 1.28.1 / 1.27.2 / 1.23.16", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security-tracker.debian.org/tracker/CVE-2017-0364" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T122209" } ], "source": { "advisory": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html", "discovery": "UNKNOWN" }, "title": "Special:Search allows redirects to any interwiki link", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "DATE_PUBLIC": "2017-04-06T20:49:00.000Z", "ID": "CVE-2017-0364", "STATE": "PUBLIC", "TITLE": "Special:Search allows redirects to any interwiki link" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "mediawiki", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "mediawiki" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Mediawiki before 1.28.1 / 1.27.2 / 1.23.16 contains a flaw where Special:Search allows redirects to any interwiki link." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "rediretion to any interwiki link" } ] } ] }, "references": { "reference_data": [ { "name": "[mediawiki-announce] 20170406 Security Release: 1.28.1 / 1.27.2 / 1.23.16", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html" }, { "name": "https://security-tracker.debian.org/tracker/CVE-2017-0364", "refsource": "CONFIRM", "url": "https://security-tracker.debian.org/tracker/CVE-2017-0364" }, { "name": "https://phabricator.wikimedia.org/T122209", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T122209" } ] }, "source": { "advisory": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2017-0364", "datePublished": "2018-04-13T16:00:00Z", "dateReserved": "2016-11-29T00:00:00", "dateUpdated": "2024-09-16T18:29:54.846Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-2895
Vulnerability from cvelistv5
Published
2006-06-07 10:00
Modified
2024-08-07 18:06
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in MediaWiki 1.6.0 up to versions before 1.6.7 allows remote attackers to inject arbitrary HTML and web script via the edit form.
References
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2006/2159 | vdb-entry, x_refsource_VUPEN | |
http://svn.wikimedia.org/viewvc/mediawiki/tags/REL1_6_7/phase3/RELEASE-NOTES | x_refsource_CONFIRM | |
http://mail.wikipedia.org/pipermail/mediawiki-announce/2006-June/000048.html | mailing-list, x_refsource_MLIST | |
http://secunia.com/advisories/20458 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/27029 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T18:06:26.970Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2006-2159", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/2159" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.wikimedia.org/viewvc/mediawiki/tags/REL1_6_7/phase3/RELEASE-NOTES" }, { "name": "[MediaWiki-announce] 20060606 MediaWiki 1.6.7 released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://mail.wikipedia.org/pipermail/mediawiki-announce/2006-June/000048.html" }, { "name": "20458", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20458" }, { "name": "mediawiki-edit-form-xss(27029)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27029" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-06-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in MediaWiki 1.6.0 up to versions before 1.6.7 allows remote attackers to inject arbitrary HTML and web script via the edit form." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2006-2159", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/2159" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.wikimedia.org/viewvc/mediawiki/tags/REL1_6_7/phase3/RELEASE-NOTES" }, { "name": "[MediaWiki-announce] 20060606 MediaWiki 1.6.7 released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://mail.wikipedia.org/pipermail/mediawiki-announce/2006-June/000048.html" }, { "name": "20458", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20458" }, { "name": "mediawiki-edit-form-xss(27029)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27029" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-2895", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in MediaWiki 1.6.0 up to versions before 1.6.7 allows remote attackers to inject arbitrary HTML and web script via the edit form." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2006-2159", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/2159" }, { "name": "http://svn.wikimedia.org/viewvc/mediawiki/tags/REL1_6_7/phase3/RELEASE-NOTES", "refsource": "CONFIRM", "url": "http://svn.wikimedia.org/viewvc/mediawiki/tags/REL1_6_7/phase3/RELEASE-NOTES" }, { "name": "[MediaWiki-announce] 20060606 MediaWiki 1.6.7 released", "refsource": "MLIST", "url": "http://mail.wikipedia.org/pipermail/mediawiki-announce/2006-June/000048.html" }, { "name": "20458", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20458" }, { "name": "mediawiki-edit-form-xss(27029)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27029" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-2895", "datePublished": "2006-06-07T10:00:00", "dateReserved": "2006-06-07T00:00:00", "dateUpdated": "2024-08-07T18:06:26.970Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-1766
Vulnerability from cvelistv5
Published
2011-05-23 22:00
Modified
2024-08-06 22:37
Severity ?
EPSS score ?
Summary
includes/User.php in MediaWiki before 1.16.5, when wgBlockDisablesLogin is enabled, does not clear certain cached data after verification of an auth token fails, which allows remote attackers to bypass authentication by creating crafted wikiUserID and wikiUserName cookies, or by leveraging an unattended workstation.
References
▼ | URL | Tags |
---|---|---|
http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060496.html | vendor-advisory, x_refsource_FEDORA | |
https://bugzilla.redhat.com/show_bug.cgi?id=702512 | x_refsource_CONFIRM | |
https://bugzilla.wikimedia.org/show_bug.cgi?id=28639 | x_refsource_CONFIRM | |
http://secunia.com/advisories/44684 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/47722 | vdb-entry, x_refsource_BID | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-May/000098.html | mailing-list, x_refsource_MLIST | |
http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060435.html | vendor-advisory, x_refsource_FEDORA | |
http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060507.html | vendor-advisory, x_refsource_FEDORA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:37:25.728Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "FEDORA-2011-6774", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060496.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=702512" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=28639" }, { "name": "44684", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44684" }, { "name": "47722", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/47722" }, { "name": "[mediawiki-announce] 20110505 MediaWiki security release 1.16.5", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-May/000098.html" }, { "name": "FEDORA-2011-6781", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060435.html" }, { "name": "FEDORA-2011-6775", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060507.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-05-05T00:00:00", "descriptions": [ { "lang": "en", "value": "includes/User.php in MediaWiki before 1.16.5, when wgBlockDisablesLogin is enabled, does not clear certain cached data after verification of an auth token fails, which allows remote attackers to bypass authentication by creating crafted wikiUserID and wikiUserName cookies, or by leveraging an unattended workstation." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-06-16T09:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "FEDORA-2011-6774", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060496.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=702512" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=28639" }, { "name": "44684", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44684" }, { "name": "47722", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/47722" }, { "name": "[mediawiki-announce] 20110505 MediaWiki security release 1.16.5", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-May/000098.html" }, { "name": "FEDORA-2011-6781", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060435.html" }, { "name": "FEDORA-2011-6775", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060507.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-1766", "datePublished": "2011-05-23T22:00:00", "dateReserved": "2011-04-19T00:00:00", "dateUpdated": "2024-08-06T22:37:25.728Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-35625
Vulnerability from cvelistv5
Published
2020-12-21 22:36
Modified
2024-08-04 17:09
Severity ?
EPSS score ?
Summary
An issue was discovered in the Widgets extension for MediaWiki through 1.35.1. Any user with the ability to edit pages within the Widgets namespace could call any static function within any class (defined within PHP or MediaWiki) via a crafted HTML comment, related to a Smarty template. For example, a person in the Widget Editors group could use \MediaWiki\Shell\Shell::command within a comment.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T269718 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/Ic899a8b15bc510e61cdacb5c024af2d226a2dbeb | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:09:14.607Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T269718" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/Ic899a8b15bc510e61cdacb5c024af2d226a2dbeb" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the Widgets extension for MediaWiki through 1.35.1. Any user with the ability to edit pages within the Widgets namespace could call any static function within any class (defined within PHP or MediaWiki) via a crafted HTML comment, related to a Smarty template. For example, a person in the Widget Editors group could use \\MediaWiki\\Shell\\Shell::command within a comment." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-21T22:36:26", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T269718" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/Ic899a8b15bc510e61cdacb5c024af2d226a2dbeb" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-35625", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in the Widgets extension for MediaWiki through 1.35.1. Any user with the ability to edit pages within the Widgets namespace could call any static function within any class (defined within PHP or MediaWiki) via a crafted HTML comment, related to a Smarty template. For example, a person in the Widget Editors group could use \\MediaWiki\\Shell\\Shell::command within a comment." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T269718", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T269718" }, { "name": "https://gerrit.wikimedia.org/r/q/Ic899a8b15bc510e61cdacb5c024af2d226a2dbeb", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/Ic899a8b15bc510e61cdacb5c024af2d226a2dbeb" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-35625", "datePublished": "2020-12-21T22:36:26", "dateReserved": "2020-12-21T00:00:00", "dateUpdated": "2024-08-04T17:09:14.607Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22945
Vulnerability from cvelistv5
Published
2023-01-11 00:00
Modified
2024-08-02 10:20
Severity ?
EPSS score ?
Summary
In the GrowthExperiments extension for MediaWiki through 1.39, the growthmanagementorlist API allows blocked users (blocked in ApiManageMentorList) to enroll as mentors or edit any of their mentorship-related properties.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:20:31.473Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T321733" }, { "tags": [ "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/Id1b83fcd58eccb8b2dfea44a3ab2f72314860d88" }, { "name": "FEDORA-2023-30a7a812f0", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AP65YEN762IBNQPOYGUVLTQIDLM5XD2A/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In the GrowthExperiments extension for MediaWiki through 1.39, the growthmanagementorlist API allows blocked users (blocked in ApiManageMentorList) to enroll as mentors or edit any of their mentorship-related properties." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-27T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T321733" }, { "url": "https://gerrit.wikimedia.org/r/q/Id1b83fcd58eccb8b2dfea44a3ab2f72314860d88" }, { "name": "FEDORA-2023-30a7a812f0", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AP65YEN762IBNQPOYGUVLTQIDLM5XD2A/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-22945", "datePublished": "2023-01-11T00:00:00", "dateReserved": "2023-01-11T00:00:00", "dateUpdated": "2024-08-02T10:20:31.473Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-2938
Vulnerability from cvelistv5
Published
2015-04-13 14:00
Modified
2024-08-06 05:32
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2 allows remote attackers to inject arbitrary web script or HTML via a custom JavaScript file, which is not properly handled when previewing the file.
References
▼ | URL | Tags |
---|---|---|
https://security.gentoo.org/glsa/201510-05 | vendor-advisory, x_refsource_GENTOO | |
http://www.mandriva.com/security/advisories?name=MDVSA-2015:200 | vendor-advisory, x_refsource_MANDRIVA | |
http://www.securityfocus.com/bid/73477 | vdb-entry, x_refsource_BID | |
http://www.openwall.com/lists/oss-security/2015/04/07/3 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2015/04/01/1 | mailing-list, x_refsource_MLIST | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html | mailing-list, x_refsource_MLIST | |
https://phabricator.wikimedia.org/T85855 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:32:20.836Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201510-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201510-05" }, { "name": "MDVSA-2015:200", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:200" }, { "name": "73477", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/73477" }, { "name": "[oss-security] 20150407 Re: CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/04/07/3" }, { "name": "[oss-security] 20150331 CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/04/01/1" }, { "name": "[MediaWiki-announce] 20150331 MediaWiki Security and Maintenance Releases: 1.19.24, 1.23.9, and 1.24.2", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T85855" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-03-31T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2 allows remote attackers to inject arbitrary web script or HTML via a custom JavaScript file, which is not properly handled when previewing the file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-05T21:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "GLSA-201510-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201510-05" }, { "name": "MDVSA-2015:200", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:200" }, { "name": "73477", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/73477" }, { "name": "[oss-security] 20150407 Re: CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/04/07/3" }, { "name": "[oss-security] 20150331 CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/04/01/1" }, { "name": "[MediaWiki-announce] 20150331 MediaWiki Security and Maintenance Releases: 1.19.24, 1.23.9, and 1.24.2", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T85855" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-2938", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2 allows remote attackers to inject arbitrary web script or HTML via a custom JavaScript file, which is not properly handled when previewing the file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201510-05", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201510-05" }, { "name": "MDVSA-2015:200", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:200" }, { "name": "73477", "refsource": "BID", "url": "http://www.securityfocus.com/bid/73477" }, { "name": "[oss-security] 20150407 Re: CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/04/07/3" }, { "name": "[oss-security] 20150331 CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/04/01/1" }, { "name": "[MediaWiki-announce] 20150331 MediaWiki Security and Maintenance Releases: 1.19.24, 1.23.9, and 1.24.2", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html" }, { "name": "https://phabricator.wikimedia.org/T85855", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T85855" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-2938", "datePublished": "2015-04-13T14:00:00", "dateReserved": "2015-04-07T00:00:00", "dateUpdated": "2024-08-06T05:32:20.836Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-5394
Vulnerability from cvelistv5
Published
2013-12-13 18:00
Modified
2024-08-06 21:05
Severity ?
EPSS score ?
Summary
Cross-site request forgery (CSRF) vulnerability in the CentralAuth extension for MediaWiki before 1.19.9, 1.20.x before 1.20.8, and 1.21.x before 1.21.3 allows remote attackers to hijack the authentication of users for requests that login via vectors involving image loading.
References
▼ | URL | Tags |
---|---|---|
https://bugzilla.wikimedia.org/show_bug.cgi?id=40747 | x_refsource_CONFIRM | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-November/000135.html | mailing-list, x_refsource_MLIST | |
http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123011.html | vendor-advisory, x_refsource_FEDORA | |
http://lists.fedoraproject.org/pipermail/package-announce/2013-December/122998.html | vendor-advisory, x_refsource_FEDORA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:05:47.260Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=40747" }, { "name": "[MediaWiki-announce] 20131114 MediaWiki Security Release: 1.21.3, 1.20.8 and 1.19.9", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-November/000135.html" }, { "name": "FEDORA-2013-21856", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123011.html" }, { "name": "FEDORA-2013-21874", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/122998.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-10-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability in the CentralAuth extension for MediaWiki before 1.19.9, 1.20.x before 1.20.8, and 1.21.x before 1.21.3 allows remote attackers to hijack the authentication of users for requests that login via vectors involving image loading." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-12-13T17:57:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=40747" }, { "name": "[MediaWiki-announce] 20131114 MediaWiki Security Release: 1.21.3, 1.20.8 and 1.19.9", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-November/000135.html" }, { "name": "FEDORA-2013-21856", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123011.html" }, { "name": "FEDORA-2013-21874", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/122998.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-5394", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site request forgery (CSRF) vulnerability in the CentralAuth extension for MediaWiki before 1.19.9, 1.20.x before 1.20.8, and 1.21.x before 1.21.3 allows remote attackers to hijack the authentication of users for requests that login via vectors involving image loading." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.wikimedia.org/show_bug.cgi?id=40747", "refsource": "CONFIRM", "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=40747" }, { "name": "[MediaWiki-announce] 20131114 MediaWiki Security Release: 1.21.3, 1.20.8 and 1.19.9", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-November/000135.html" }, { "name": "FEDORA-2013-21856", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123011.html" }, { "name": "FEDORA-2013-21874", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/122998.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-5394", "datePublished": "2013-12-13T18:00:00", "dateReserved": "2012-10-17T00:00:00", "dateUpdated": "2024-08-06T21:05:47.260Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-8004
Vulnerability from cvelistv5
Published
2015-11-09 18:00
Modified
2024-08-06 08:06
Severity ?
EPSS score ?
Summary
MediaWiki before 1.23.11, 1.24.x before 1.24.4, and 1.25.x before 1.25.3 does not properly restrict access to revisions, which allows remote authenticated users with the viewsuppressed user right to remove revision suppressions via a crafted revisiondelete action, which returns a valid a change form.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T95589 | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1034028 | vdb-entry, x_refsource_SECTRACK | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-October/000181.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:06:31.578Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T95589" }, { "name": "1034028", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1034028" }, { "name": "[MediaWiki-announce] 20151016 Security Release: 1.25.3, 1.24.4 and 1.23.11", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-October/000181.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-10-16T00:00:00", "descriptions": [ { "lang": "en", "value": "MediaWiki before 1.23.11, 1.24.x before 1.24.4, and 1.25.x before 1.25.3 does not properly restrict access to revisions, which allows remote authenticated users with the viewsuppressed user right to remove revision suppressions via a crafted revisiondelete action, which returns a valid a change form." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-11-09T17:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T95589" }, { "name": "1034028", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1034028" }, { "name": "[MediaWiki-announce] 20151016 Security Release: 1.25.3, 1.24.4 and 1.23.11", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-October/000181.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-8004", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MediaWiki before 1.23.11, 1.24.x before 1.24.4, and 1.25.x before 1.25.3 does not properly restrict access to revisions, which allows remote authenticated users with the viewsuppressed user right to remove revision suppressions via a crafted revisiondelete action, which returns a valid a change form." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T95589", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T95589" }, { "name": "1034028", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034028" }, { "name": "[MediaWiki-announce] 20151016 Security Release: 1.25.3, 1.24.4 and 1.23.11", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-October/000181.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-8004", "datePublished": "2015-11-09T18:00:00", "dateReserved": "2015-10-28T00:00:00", "dateUpdated": "2024-08-06T08:06:31.578Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-1686
Vulnerability from cvelistv5
Published
2018-04-13 21:00
Modified
2024-08-06 09:50
Severity ?
EPSS score ?
Summary
MediaWiki 1.18.0 allows remote attackers to obtain the installation path via vectors related to thumbnail creation.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/91847 | vdb-entry, x_refsource_XF | |
https://packetstormsecurity.com/files/125682 | x_refsource_MISC | |
http://www.securityfocus.com/bid/66141 | vdb-entry, x_refsource_BID | |
http://seclists.org/fulldisclosure/2014/Mar/102 | mailing-list, x_refsource_FULLDISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T09:50:09.977Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "mediawiki-cve20141686-path-disclosure(91847)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91847" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://packetstormsecurity.com/files/125682" }, { "name": "66141", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/66141" }, { "name": "20140312 CVE-2014-1686 -- Information disclosure: webserver source path in Mediawiki 1.18.0", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2014/Mar/102" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-03-12T00:00:00", "descriptions": [ { "lang": "en", "value": "MediaWiki 1.18.0 allows remote attackers to obtain the installation path via vectors related to thumbnail creation." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-04-13T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "mediawiki-cve20141686-path-disclosure(91847)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91847" }, { "tags": [ "x_refsource_MISC" ], "url": "https://packetstormsecurity.com/files/125682" }, { "name": "66141", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/66141" }, { "name": "20140312 CVE-2014-1686 -- Information disclosure: webserver source path in Mediawiki 1.18.0", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2014/Mar/102" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-1686", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MediaWiki 1.18.0 allows remote attackers to obtain the installation path via vectors related to thumbnail creation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "mediawiki-cve20141686-path-disclosure(91847)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/91847" }, { "name": "https://packetstormsecurity.com/files/125682", "refsource": "MISC", "url": "https://packetstormsecurity.com/files/125682" }, { "name": "66141", "refsource": "BID", "url": "http://www.securityfocus.com/bid/66141" }, { "name": "20140312 CVE-2014-1686 -- Information disclosure: webserver source path in Mediawiki 1.18.0", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2014/Mar/102" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-1686", "datePublished": "2018-04-13T21:00:00", "dateReserved": "2014-01-28T00:00:00", "dateUpdated": "2024-08-06T09:50:09.977Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-12471
Vulnerability from cvelistv5
Published
2019-07-10 15:49
Modified
2024-08-04 23:24
Severity ?
EPSS score ?
Summary
Wikimedia MediaWiki 1.30.0 through 1.32.1 has XSS. Loading user JavaScript from a non-existent account allows anyone to create the account, and perform XSS on users loading that script. Fixed in 1.32.2, 1.31.2, 1.30.2 and 1.27.6.
References
▼ | URL | Tags |
---|---|---|
https://www.debian.org/security/2019/dsa-4460 | vendor-advisory, x_refsource_DEBIAN | |
https://seclists.org/bugtraq/2019/Jun/12 | mailing-list, x_refsource_BUGTRAQ | |
https://phabricator.wikimedia.org/T207603 | x_refsource_MISC | |
https://lists.wikimedia.org/pipermail/wikitech-l/2019-June/092152.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:24:37.083Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "DSA-4460", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2019/dsa-4460" }, { "name": "20190612 [SECURITY] [DSA 4460-1] mediawiki security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Jun/12" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T207603" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2019-June/092152.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Wikimedia MediaWiki 1.30.0 through 1.32.1 has XSS. Loading user JavaScript from a non-existent account allows anyone to create the account, and perform XSS on users loading that script. Fixed in 1.32.2, 1.31.2, 1.30.2 and 1.27.6." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-07-10T15:50:49", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "DSA-4460", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2019/dsa-4460" }, { "name": "20190612 [SECURITY] [DSA 4460-1] mediawiki security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Jun/12" }, { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T207603" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2019-June/092152.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-12471", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Wikimedia MediaWiki 1.30.0 through 1.32.1 has XSS. Loading user JavaScript from a non-existent account allows anyone to create the account, and perform XSS on users loading that script. Fixed in 1.32.2, 1.31.2, 1.30.2 and 1.27.6." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "DSA-4460", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2019/dsa-4460" }, { "name": "20190612 [SECURITY] [DSA 4460-1] mediawiki security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Jun/12" }, { "name": "https://phabricator.wikimedia.org/T207603", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T207603" }, { "name": "https://lists.wikimedia.org/pipermail/wikitech-l/2019-June/092152.html", "refsource": "CONFIRM", "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2019-June/092152.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-12471", "datePublished": "2019-07-10T15:49:21", "dateReserved": "2019-05-30T00:00:00", "dateUpdated": "2024-08-04T23:24:37.083Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-6452
Vulnerability from cvelistv5
Published
2014-05-12 14:00
Modified
2024-08-06 17:39
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in MediaWiki before 1.19.10, 1.2x before 1.21.4, and 1.22.x before 1.22.1 allows remote attackers to inject arbitrary web script or HTML via crafted XSL in an SVG file.
References
▼ | URL | Tags |
---|---|---|
http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000138.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T17:39:01.306Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[MediaWiki-announce] 20140114 MediaWiki Security Releases: 1.22.1, 1.21.4 and 1.19.10", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000138.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-01-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in MediaWiki before 1.19.10, 1.2x before 1.21.4, and 1.22.x before 1.22.1 allows remote attackers to inject arbitrary web script or HTML via crafted XSL in an SVG file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-05-12T13:57:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[MediaWiki-announce] 20140114 MediaWiki Security Releases: 1.22.1, 1.21.4 and 1.19.10", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000138.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-6452", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in MediaWiki before 1.19.10, 1.2x before 1.21.4, and 1.22.x before 1.22.1 allows remote attackers to inject arbitrary web script or HTML via crafted XSL in an SVG file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[MediaWiki-announce] 20140114 MediaWiki Security Releases: 1.22.1, 1.21.4 and 1.19.10", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000138.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-6452", "datePublished": "2014-05-12T14:00:00", "dateReserved": "2013-11-04T00:00:00", "dateUpdated": "2024-08-06T17:39:01.306Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-4360
Vulnerability from cvelistv5
Published
2012-01-08 11:00
Modified
2024-08-07 00:09
Severity ?
EPSS score ?
Summary
MediaWiki before 1.17.1 allows remote attackers to obtain the page titles of all restricted pages via a series of requests involving the (1) curid or (2) oldid parameter.
References
▼ | URL | Tags |
---|---|---|
http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-November/000104.html | mailing-list, x_refsource_MLIST | |
https://bugzilla.redhat.com/show_bug.cgi?id=758171 | x_refsource_CONFIRM | |
http://openwall.com/lists/oss-security/2011/11/29/6 | mailing-list, x_refsource_MLIST | |
https://bugzilla.wikimedia.org/show_bug.cgi?id=32276 | x_refsource_CONFIRM | |
http://openwall.com/lists/oss-security/2011/11/29/12 | mailing-list, x_refsource_MLIST | |
http://www.debian.org/security/2011/dsa-2366 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:09:18.347Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[mediawiki-announce] 20111128 MediaWiki security release 1.17.1", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-November/000104.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=758171" }, { "name": "[oss-security] 20111129 CVE request: mediawiki before 1.17.1", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/11/29/6" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=32276" }, { "name": "[oss-security] 20111129 Re: CVE request: mediawiki before 1.17.1", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/11/29/12" }, { "name": "DSA-2366", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2366" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-11-28T00:00:00", "descriptions": [ { "lang": "en", "value": "MediaWiki before 1.17.1 allows remote attackers to obtain the page titles of all restricted pages via a series of requests involving the (1) curid or (2) oldid parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-01-19T10:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[mediawiki-announce] 20111128 MediaWiki security release 1.17.1", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-November/000104.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=758171" }, { "name": "[oss-security] 20111129 CVE request: mediawiki before 1.17.1", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/11/29/6" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=32276" }, { "name": "[oss-security] 20111129 Re: CVE request: mediawiki before 1.17.1", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/11/29/12" }, { "name": "DSA-2366", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2366" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-4360", "datePublished": "2012-01-08T11:00:00", "dateReserved": "2011-11-04T00:00:00", "dateUpdated": "2024-08-07T00:09:18.347Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-4567
Vulnerability from cvelistv5
Published
2013-12-13 18:00
Modified
2024-08-06 16:45
Severity ?
EPSS score ?
Summary
Incomplete blacklist vulnerability in Sanitizer::checkCss in MediaWiki before 1.19.9, 1.20.x before 1.20.8, and 1.21.x before 1.21.3 allows remote attackers to conduct cross-site scripting (XSS) attacks via a \b (backspace) character in CSS.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/63760 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/57472 | third-party-advisory, x_refsource_SECUNIA | |
http://www.debian.org/security/2014/dsa-2891 | vendor-advisory, x_refsource_DEBIAN | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-November/000135.html | mailing-list, x_refsource_MLIST | |
http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123011.html | vendor-advisory, x_refsource_FEDORA | |
http://lists.fedoraproject.org/pipermail/package-announce/2013-December/122998.html | vendor-advisory, x_refsource_FEDORA | |
https://bugzilla.wikimedia.org/show_bug.cgi?id=55332 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:45:14.879Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "63760", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/63760" }, { "name": "57472", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/57472" }, { "name": "DSA-2891", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-2891" }, { "name": "[MediaWiki-announce] 20131114 MediaWiki Security Release: 1.21.3, 1.20.8 and 1.19.9", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-November/000135.html" }, { "name": "FEDORA-2013-21856", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123011.html" }, { "name": "FEDORA-2013-21874", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/122998.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=55332" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-10-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Incomplete blacklist vulnerability in Sanitizer::checkCss in MediaWiki before 1.19.9, 1.20.x before 1.20.8, and 1.21.x before 1.21.3 allows remote attackers to conduct cross-site scripting (XSS) attacks via a \\b (backspace) character in CSS." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-29T18:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "63760", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/63760" }, { "name": "57472", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/57472" }, { "name": "DSA-2891", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-2891" }, { "name": "[MediaWiki-announce] 20131114 MediaWiki Security Release: 1.21.3, 1.20.8 and 1.19.9", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-November/000135.html" }, { "name": "FEDORA-2013-21856", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123011.html" }, { "name": "FEDORA-2013-21874", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/122998.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=55332" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4567", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Incomplete blacklist vulnerability in Sanitizer::checkCss in MediaWiki before 1.19.9, 1.20.x before 1.20.8, and 1.21.x before 1.21.3 allows remote attackers to conduct cross-site scripting (XSS) attacks via a \\b (backspace) character in CSS." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "63760", "refsource": "BID", "url": "http://www.securityfocus.com/bid/63760" }, { "name": "57472", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/57472" }, { "name": "DSA-2891", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-2891" }, { "name": "[MediaWiki-announce] 20131114 MediaWiki Security Release: 1.21.3, 1.20.8 and 1.19.9", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-November/000135.html" }, { "name": "FEDORA-2013-21856", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123011.html" }, { "name": "FEDORA-2013-21874", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/122998.html" }, { "name": "https://bugzilla.wikimedia.org/show_bug.cgi?id=55332", "refsource": "CONFIRM", "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=55332" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-4567", "datePublished": "2013-12-13T18:00:00", "dateReserved": "2013-06-12T00:00:00", "dateUpdated": "2024-08-06T16:45:14.879Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-29904
Vulnerability from cvelistv5
Published
2022-04-29 03:43
Modified
2024-08-03 06:33
Severity ?
EPSS score ?
Summary
The SemanticDrilldown extension for MediaWiki through 1.37.2 (before e688bdba6434591b5dff689a45e4d53459954773) allows SQL injection with certain '-' and '_' constraints.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T306463 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/c/mediawiki/extensions/SemanticDrilldown/+/785213 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:33:43.149Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T306463" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/SemanticDrilldown/+/785213" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The SemanticDrilldown extension for MediaWiki through 1.37.2 (before e688bdba6434591b5dff689a45e4d53459954773) allows SQL injection with certain \u0027-\u0027 and \u0027_\u0027 constraints." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-29T03:43:51", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T306463" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/SemanticDrilldown/+/785213" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-29904", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The SemanticDrilldown extension for MediaWiki through 1.37.2 (before e688bdba6434591b5dff689a45e4d53459954773) allows SQL injection with certain \u0027-\u0027 and \u0027_\u0027 constraints." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T306463", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T306463" }, { "name": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/SemanticDrilldown/+/785213", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/SemanticDrilldown/+/785213" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-29904", "datePublished": "2022-04-29T03:43:51", "dateReserved": "2022-04-29T00:00:00", "dateUpdated": "2024-08-03T06:33:43.149Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-0368
Vulnerability from cvelistv5
Published
2018-04-13 16:00
Modified
2024-09-16 23:30
Severity ?
EPSS score ?
Summary
Mediawiki before 1.28.1 / 1.27.2 / 1.23.16 contains a flaw making rawHTML mode apply to system messages.
References
▼ | URL | Tags |
---|---|---|
https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html | mailing-list, x_refsource_MLIST | |
https://phabricator.wikimedia.org/T156184 | x_refsource_CONFIRM | |
https://security-tracker.debian.org/tracker/CVE-2017-0368 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T13:03:57.017Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[mediawiki-announce] 20170406 Security Release: 1.28.1 / 1.27.2 / 1.23.16", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T156184" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security-tracker.debian.org/tracker/CVE-2017-0368" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "mediawiki", "vendor": "mediawiki", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-04-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Mediawiki before 1.28.1 / 1.27.2 / 1.23.16 contains a flaw making rawHTML mode apply to system messages." } ], "problemTypes": [ { "descriptions": [ { "description": "missing sanitization", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-04-13T15:57:01", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "name": "[mediawiki-announce] 20170406 Security Release: 1.28.1 / 1.27.2 / 1.23.16", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T156184" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security-tracker.debian.org/tracker/CVE-2017-0368" } ], "source": { "advisory": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html", "discovery": "UNKNOWN" }, "title": "Make rawHTML mode not apply to system messages", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "DATE_PUBLIC": "2017-04-06T20:49:00.000Z", "ID": "CVE-2017-0368", "STATE": "PUBLIC", "TITLE": "Make rawHTML mode not apply to system messages" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "mediawiki", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "mediawiki" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Mediawiki before 1.28.1 / 1.27.2 / 1.23.16 contains a flaw making rawHTML mode apply to system messages." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "missing sanitization" } ] } ] }, "references": { "reference_data": [ { "name": "[mediawiki-announce] 20170406 Security Release: 1.28.1 / 1.27.2 / 1.23.16", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html" }, { "name": "https://phabricator.wikimedia.org/T156184", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T156184" }, { "name": "https://security-tracker.debian.org/tracker/CVE-2017-0368", "refsource": "CONFIRM", "url": "https://security-tracker.debian.org/tracker/CVE-2017-0368" } ] }, "source": { "advisory": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2017-0368", "datePublished": "2018-04-13T16:00:00Z", "dateReserved": "2016-11-29T00:00:00", "dateUpdated": "2024-09-16T23:30:26.165Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-42040
Vulnerability from cvelistv5
Published
2021-10-06 20:28
Modified
2024-08-04 03:22
Severity ?
EPSS score ?
Summary
An issue was discovered in MediaWiki through 1.36.2. A parser function related to loop control allowed for an infinite loop (and php-fpm hang) within the Loops extension because egLoopsCountLimit is mishandled. This could lead to memory exhaustion.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T287347 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/I0caf6f129f94612b5bcf406a171aa5ffedea1f80 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:22:25.637Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T287347" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/I0caf6f129f94612b5bcf406a171aa5ffedea1f80" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MediaWiki through 1.36.2. A parser function related to loop control allowed for an infinite loop (and php-fpm hang) within the Loops extension because egLoopsCountLimit is mishandled. This could lead to memory exhaustion." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-06T20:28:59", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T287347" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/I0caf6f129f94612b5bcf406a171aa5ffedea1f80" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-42040", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in MediaWiki through 1.36.2. A parser function related to loop control allowed for an infinite loop (and php-fpm hang) within the Loops extension because egLoopsCountLimit is mishandled. This could lead to memory exhaustion." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T287347", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T287347" }, { "name": "https://gerrit.wikimedia.org/r/q/I0caf6f129f94612b5bcf406a171aa5ffedea1f80", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/I0caf6f129f94612b5bcf406a171aa5ffedea1f80" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-42040", "datePublished": "2021-10-06T20:28:59", "dateReserved": "2021-10-06T00:00:00", "dateUpdated": "2024-08-04T03:22:25.637Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-0503
Vulnerability from cvelistv5
Published
2018-10-04 20:00
Modified
2024-09-17 01:30
Severity ?
EPSS score ?
Summary
Mediawiki 1.31 before 1.31.1, 1.30.1, 1.29.3 and 1.27.5 contains a flaw where contrary to the documentation, $wgRateLimits entry for 'user' overrides that for 'newbie'.
References
▼ | URL | Tags |
---|---|---|
https://lists.wikimedia.org/pipermail/wikitech-l/2018-September/090849.html | mailing-list, x_refsource_MLIST | |
http://www.securitytracker.com/id/1041695 | vdb-entry, x_refsource_SECTRACK | |
https://phabricator.wikimedia.org/T169545 | x_refsource_CONFIRM | |
https://www.debian.org/security/2018/dsa-4301 | vendor-advisory, x_refsource_DEBIAN | |
https://access.redhat.com/errata/RHSA-2019:3142 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2019:3238 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2019:3813 | vendor-advisory, x_refsource_REDHAT |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:28:10.915Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[wikitech-l] 20180920 Security release: 1.27.5 / 1.29.3 / 1.30.1 / 1.31.1", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2018-September/090849.html" }, { "name": "1041695", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1041695" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T169545" }, { "name": "DSA-4301", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4301" }, { "name": "RHSA-2019:3142", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:3142" }, { "name": "RHSA-2019:3238", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:3238" }, { "name": "RHSA-2019:3813", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:3813" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "mediawiki", "vendor": "mediawiki", "versions": [ { "status": "affected", "version": "before 1.31.1, 1.30.1, 1.29.3 and 1.27.5" } ] } ], "datePublic": "2018-09-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Mediawiki 1.31 before 1.31.1, 1.30.1, 1.29.3 and 1.27.5 contains a flaw where contrary to the documentation, $wgRateLimits entry for \u0027user\u0027 overrides that for \u0027newbie\u0027." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper imlementation of documentation / spec", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-07T18:06:38", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "name": "[wikitech-l] 20180920 Security release: 1.27.5 / 1.29.3 / 1.30.1 / 1.31.1", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2018-September/090849.html" }, { "name": "1041695", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1041695" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T169545" }, { "name": "DSA-4301", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4301" }, { "name": "RHSA-2019:3142", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:3142" }, { "name": "RHSA-2019:3238", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:3238" }, { "name": "RHSA-2019:3813", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:3813" } ], "source": { "discovery": "UNKNOWN" }, "title": "$wgRateLimits entry for \u0027user\u0027 overrides \u0027newbie\u0027", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "DATE_PUBLIC": "2018-09-20T21:18:00.000Z", "ID": "CVE-2018-0503", "STATE": "PUBLIC", "TITLE": "$wgRateLimits entry for \u0027user\u0027 overrides \u0027newbie\u0027" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "mediawiki", "version": { "version_data": [ { "version_value": "before 1.31.1, 1.30.1, 1.29.3 and 1.27.5" } ] } } ] }, "vendor_name": "mediawiki" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Mediawiki 1.31 before 1.31.1, 1.30.1, 1.29.3 and 1.27.5 contains a flaw where contrary to the documentation, $wgRateLimits entry for \u0027user\u0027 overrides that for \u0027newbie\u0027." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper imlementation of documentation / spec" } ] } ] }, "references": { "reference_data": [ { "name": "[wikitech-l] 20180920 Security release: 1.27.5 / 1.29.3 / 1.30.1 / 1.31.1", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2018-September/090849.html" }, { "name": "1041695", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041695" }, { "name": "https://phabricator.wikimedia.org/T169545", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T169545" }, { "name": "DSA-4301", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4301" }, { "name": "RHSA-2019:3142", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3142" }, { "name": "RHSA-2019:3238", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3238" }, { "name": "RHSA-2019:3813", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3813" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2018-0503", "datePublished": "2018-10-04T20:00:00Z", "dateReserved": "2017-11-27T00:00:00", "dateUpdated": "2024-09-17T01:30:58.026Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-2032
Vulnerability from cvelistv5
Published
2013-11-15 18:16
Modified
2024-08-06 15:20
Severity ?
EPSS score ?
Summary
MediaWiki before 1.19.6 and 1.20.x before 1.20.5 does not allow extensions to prevent password changes without using both Special:PasswordReset and Special:ChangePassword, which allows remote attackers to bypass the intended restrictions of an extension that only implements one of these blocks.
References
▼ | URL | Tags |
---|---|---|
http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105825.html | vendor-advisory, x_refsource_FEDORA | |
http://secunia.com/advisories/55433 | third-party-advisory, x_refsource_SECUNIA | |
http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106293.html | vendor-advisory, x_refsource_FEDORA | |
http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105784.html | vendor-advisory, x_refsource_FEDORA | |
http://security.gentoo.org/glsa/glsa-201310-21.xml | vendor-advisory, x_refsource_GENTOO | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-April/000129.html | mailing-list, x_refsource_MLIST | |
https://bugzilla.wikimedia.org/show_bug.cgi?id=46590 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:20:37.400Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "FEDORA-2013-7714", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105825.html" }, { "name": "55433", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/55433" }, { "name": "FEDORA-2013-7654", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106293.html" }, { "name": "FEDORA-2013-7701", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105784.html" }, { "name": "GLSA-201310-21", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201310-21.xml" }, { "name": "[MediaWiki-announce] 20130430 MediaWiki Security Release: 1.20.5 and 1.19.6", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-April/000129.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=46590" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-04-30T00:00:00", "descriptions": [ { "lang": "en", "value": "MediaWiki before 1.19.6 and 1.20.x before 1.20.5 does not allow extensions to prevent password changes without using both Special:PasswordReset and Special:ChangePassword, which allows remote attackers to bypass the intended restrictions of an extension that only implements one of these blocks." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-11-25T10:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "FEDORA-2013-7714", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105825.html" }, { "name": "55433", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/55433" }, { "name": "FEDORA-2013-7654", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106293.html" }, { "name": "FEDORA-2013-7701", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105784.html" }, { "name": "GLSA-201310-21", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201310-21.xml" }, { "name": "[MediaWiki-announce] 20130430 MediaWiki Security Release: 1.20.5 and 1.19.6", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-April/000129.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=46590" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-2032", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MediaWiki before 1.19.6 and 1.20.x before 1.20.5 does not allow extensions to prevent password changes without using both Special:PasswordReset and Special:ChangePassword, which allows remote attackers to bypass the intended restrictions of an extension that only implements one of these blocks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "FEDORA-2013-7714", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105825.html" }, { "name": "55433", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/55433" }, { "name": "FEDORA-2013-7654", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106293.html" }, { "name": "FEDORA-2013-7701", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105784.html" }, { "name": "GLSA-201310-21", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201310-21.xml" }, { "name": "[MediaWiki-announce] 20130430 MediaWiki Security Release: 1.20.5 and 1.19.6", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-April/000129.html" }, { "name": "https://bugzilla.wikimedia.org/show_bug.cgi?id=46590", "refsource": "CONFIRM", "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=46590" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-2032", "datePublished": "2013-11-15T18:16:00", "dateReserved": "2013-02-19T00:00:00", "dateUpdated": "2024-08-06T15:20:37.400Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-0361
Vulnerability from cvelistv5
Published
2018-04-13 16:00
Modified
2024-09-16 21:07
Severity ?
EPSS score ?
Summary
Mediawiki before 1.28.1 / 1.27.2 / 1.23.16 contains an information disclosure flaw, where the api.log might contain passwords in plaintext.
References
▼ | URL | Tags |
---|---|---|
https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html | mailing-list, x_refsource_MLIST | |
https://security-tracker.debian.org/tracker/CVE-2017-0361 | x_refsource_CONFIRM | |
https://phabricator.wikimedia.org/T125177 | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1039812 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T13:03:56.820Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[mediawiki-announce] 20170406 Security Release: 1.28.1 / 1.27.2 / 1.23.16", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security-tracker.debian.org/tracker/CVE-2017-0361" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T125177" }, { "name": "1039812", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039812" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "mediawiki", "vendor": "mediawiki", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-04-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Mediawiki before 1.28.1 / 1.27.2 / 1.23.16 contains an information disclosure flaw, where the api.log might contain passwords in plaintext." } ], "problemTypes": [ { "descriptions": [ { "description": "information disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-04-14T09:57:01", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "name": "[mediawiki-announce] 20170406 Security Release: 1.28.1 / 1.27.2 / 1.23.16", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security-tracker.debian.org/tracker/CVE-2017-0361" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T125177" }, { "name": "1039812", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039812" } ], "source": { "advisory": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html", "discovery": "UNKNOWN" }, "title": "api.log contains passwords in plaintext", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "DATE_PUBLIC": "2017-04-06T20:49:00.000Z", "ID": "CVE-2017-0361", "STATE": "PUBLIC", "TITLE": "api.log contains passwords in plaintext" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "mediawiki", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "mediawiki" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Mediawiki before 1.28.1 / 1.27.2 / 1.23.16 contains an information disclosure flaw, where the api.log might contain passwords in plaintext." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "information disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "[mediawiki-announce] 20170406 Security Release: 1.28.1 / 1.27.2 / 1.23.16", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html" }, { "name": "https://security-tracker.debian.org/tracker/CVE-2017-0361", "refsource": "CONFIRM", "url": "https://security-tracker.debian.org/tracker/CVE-2017-0361" }, { "name": "https://phabricator.wikimedia.org/T125177", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T125177" }, { "name": "1039812", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039812" } ] }, "source": { "advisory": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2017-0361", "datePublished": "2018-04-13T16:00:00Z", "dateReserved": "2016-11-29T00:00:00", "dateUpdated": "2024-09-16T21:07:38.929Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-45363
Vulnerability from cvelistv5
Published
2023-10-09 00:00
Modified
2024-10-15 18:00
Severity ?
EPSS score ?
Summary
An issue was discovered in ApiPageSet.php in MediaWiki before 1.35.12, 1.36.x through 1.39.x before 1.39.5, and 1.40.x before 1.40.1. It allows attackers to cause a denial of service (unbounded loop and RequestTimeoutException) when querying pages redirected to other variants with redirects and converttitles set.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T333050 | ||
https://www.debian.org/security/2023/dsa-5520 | vendor-advisory | |
https://lists.debian.org/debian-lts-announce/2023/11/msg00027.html | mailing-list |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:21:16.463Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T333050" }, { "name": "DSA-5520", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5520" }, { "name": "[debian-lts-announce] 20231128 [SECURITY] [DLA 3671-1] mediawiki security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00027.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-45363", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-15T17:28:57.152625Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-835", "description": "CWE-835 Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-15T18:00:10.847Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in ApiPageSet.php in MediaWiki before 1.35.12, 1.36.x through 1.39.x before 1.39.5, and 1.40.x before 1.40.1. It allows attackers to cause a denial of service (unbounded loop and RequestTimeoutException) when querying pages redirected to other variants with redirects and converttitles set." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-28T13:06:18.349530", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T333050" }, { "name": "DSA-5520", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2023/dsa-5520" }, { "name": "[debian-lts-announce] 20231128 [SECURITY] [DLA 3671-1] mediawiki security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00027.html" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-45363", "datePublished": "2023-10-09T00:00:00", "dateReserved": "2023-10-09T00:00:00", "dateUpdated": "2024-10-15T18:00:10.847Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-12474
Vulnerability from cvelistv5
Published
2019-07-10 15:58
Modified
2024-08-04 23:24
Severity ?
EPSS score ?
Summary
Wikimedia MediaWiki 1.23.0 through 1.32.1 has an information leak. Privileged API responses that include whether a recent change has been patrolled may be cached publicly. Fixed in 1.32.2, 1.31.2, 1.30.2 and 1.27.6.
References
▼ | URL | Tags |
---|---|---|
https://www.debian.org/security/2019/dsa-4460 | vendor-advisory, x_refsource_DEBIAN | |
https://seclists.org/bugtraq/2019/Jun/12 | mailing-list, x_refsource_BUGTRAQ | |
https://phabricator.wikimedia.org/T212118 | x_refsource_MISC | |
https://lists.wikimedia.org/pipermail/wikitech-l/2019-June/092152.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:24:38.430Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "DSA-4460", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2019/dsa-4460" }, { "name": "20190612 [SECURITY] [DSA 4460-1] mediawiki security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Jun/12" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T212118" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2019-June/092152.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Wikimedia MediaWiki 1.23.0 through 1.32.1 has an information leak. Privileged API responses that include whether a recent change has been patrolled may be cached publicly. Fixed in 1.32.2, 1.31.2, 1.30.2 and 1.27.6." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-07-10T15:58:16", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "DSA-4460", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2019/dsa-4460" }, { "name": "20190612 [SECURITY] [DSA 4460-1] mediawiki security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Jun/12" }, { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T212118" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2019-June/092152.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-12474", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Wikimedia MediaWiki 1.23.0 through 1.32.1 has an information leak. Privileged API responses that include whether a recent change has been patrolled may be cached publicly. Fixed in 1.32.2, 1.31.2, 1.30.2 and 1.27.6." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "DSA-4460", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2019/dsa-4460" }, { "name": "20190612 [SECURITY] [DSA 4460-1] mediawiki security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Jun/12" }, { "name": "https://phabricator.wikimedia.org/T212118", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T212118" }, { "name": "https://lists.wikimedia.org/pipermail/wikitech-l/2019-June/092152.html", "refsource": "CONFIRM", "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2019-June/092152.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-12474", "datePublished": "2019-07-10T15:58:05", "dateReserved": "2019-05-30T00:00:00", "dateUpdated": "2024-08-04T23:24:38.430Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-30153
Vulnerability from cvelistv5
Published
2023-04-15 00:00
Modified
2024-08-03 22:24
Severity ?
EPSS score ?
Summary
An issue was discovered in the VisualEditor extension in MediaWiki before 1.31.13, and 1.32.x through 1.35.x before 1.35.2. . When using VisualEditor to edit a MediaWiki user page belonging to an existing, but hidden, user, VisualEditor will disclose that the user exists. (It shouldn't because they are hidden.) This is related to ApiVisualEditor.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T22:24:59.673Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T270453" }, { "tags": [ "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2021-April/094418.html" }, { "tags": [ "x_transferred" ], "url": "https://lists.wikimedia.org/hyperkitty/list/wikitech-l%40lists.wikimedia.org/message/XYBF5RSTJRMVCP7QBYK7643W75A3KCIY/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the VisualEditor extension in MediaWiki before 1.31.13, and 1.32.x through 1.35.x before 1.35.2. . When using VisualEditor to edit a MediaWiki user page belonging to an existing, but hidden, user, VisualEditor will disclose that the user exists. (It shouldn\u0027t because they are hidden.) This is related to ApiVisualEditor." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-15T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T270453" }, { "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2021-April/094418.html" }, { "url": "https://lists.wikimedia.org/hyperkitty/list/wikitech-l%40lists.wikimedia.org/message/XYBF5RSTJRMVCP7QBYK7643W75A3KCIY/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-30153", "datePublished": "2023-04-15T00:00:00", "dateReserved": "2021-04-06T00:00:00", "dateUpdated": "2024-08-03T22:24:59.673Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-4408
Vulnerability from cvelistv5
Published
2008-10-03 17:18
Modified
2024-08-07 10:17
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in MediaWiki 1.13.1, 1.12.0, and possibly other versions before 1.13.2 allows remote attackers to inject arbitrary web script or HTML via the useskin parameter to an unspecified component.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T10:17:09.338Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "mediawiki-useskin-xss(45632)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45632" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_13_2/phase3/RELEASE-NOTES" }, { "name": "[oss-security] 20081002 CVE request: XSS in mediawiki 1.13.1 and 1.12.0", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2008/10/02/3" }, { "name": "31540", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/31540" }, { "name": "32128", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32128" }, { "name": "FEDORA-2008-8678", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00220.html" }, { "name": "ADV-2008-2737", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2737" }, { "name": "FEDORA-2008-8639", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00179.html" }, { "name": "32131", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32131" }, { "name": "[MediaWiki-announce] 20081002 MediaWiki 1.13.2, 1.12.1 security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2008-October/000078.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_12_1/phase3/RELEASE-NOTES" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-10-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in MediaWiki 1.13.1, 1.12.0, and possibly other versions before 1.13.2 allows remote attackers to inject arbitrary web script or HTML via the useskin parameter to an unspecified component." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-07T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "mediawiki-useskin-xss(45632)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45632" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_13_2/phase3/RELEASE-NOTES" }, { "name": "[oss-security] 20081002 CVE request: XSS in mediawiki 1.13.1 and 1.12.0", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2008/10/02/3" }, { "name": "31540", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/31540" }, { "name": "32128", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32128" }, { "name": "FEDORA-2008-8678", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00220.html" }, { "name": "ADV-2008-2737", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2737" }, { "name": "FEDORA-2008-8639", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00179.html" }, { "name": "32131", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32131" }, { "name": "[MediaWiki-announce] 20081002 MediaWiki 1.13.2, 1.12.1 security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2008-October/000078.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_12_1/phase3/RELEASE-NOTES" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-4408", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in MediaWiki 1.13.1, 1.12.0, and possibly other versions before 1.13.2 allows remote attackers to inject arbitrary web script or HTML via the useskin parameter to an unspecified component." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "mediawiki-useskin-xss(45632)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45632" }, { "name": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_13_2/phase3/RELEASE-NOTES", "refsource": "CONFIRM", "url": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_13_2/phase3/RELEASE-NOTES" }, { "name": "[oss-security] 20081002 CVE request: XSS in mediawiki 1.13.1 and 1.12.0", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2008/10/02/3" }, { "name": "31540", "refsource": "BID", "url": "http://www.securityfocus.com/bid/31540" }, { "name": "32128", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32128" }, { "name": "FEDORA-2008-8678", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00220.html" }, { "name": "ADV-2008-2737", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2737" }, { "name": "FEDORA-2008-8639", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00179.html" }, { "name": "32131", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32131" }, { "name": "[MediaWiki-announce] 20081002 MediaWiki 1.13.2, 1.12.1 security update", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2008-October/000078.html" }, { "name": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_12_1/phase3/RELEASE-NOTES", "refsource": "CONFIRM", "url": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_12_1/phase3/RELEASE-NOTES" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-4408", "datePublished": "2008-10-03T17:18:00", "dateReserved": "2008-10-03T00:00:00", "dateUpdated": "2024-08-07T10:17:09.338Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22910
Vulnerability from cvelistv5
Published
2023-01-20 00:00
Modified
2024-08-02 10:20
Severity ?
EPSS score ?
Summary
An issue was discovered in MediaWiki before 1.35.9, 1.36.x through 1.38.x before 1.38.5, and 1.39.x before 1.39.1. There is XSS in Wikibase date formatting via wikibase-time-precision-* fields. This allows JavaScript execution by staff/admin users who do not intentionally have the editsitejs capability.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:20:31.476Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T323592" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MediaWiki before 1.35.9, 1.36.x through 1.38.x before 1.38.5, and 1.39.x before 1.39.1. There is XSS in Wikibase date formatting via wikibase-time-precision-* fields. This allows JavaScript execution by staff/admin users who do not intentionally have the editsitejs capability." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-20T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T323592" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-22910", "datePublished": "2023-01-20T00:00:00", "dateReserved": "2023-01-10T00:00:00", "dateUpdated": "2024-08-02T10:20:31.476Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-45471
Vulnerability from cvelistv5
Published
2021-12-24 01:04
Modified
2024-08-04 04:39
Severity ?
EPSS score ?
Summary
In MediaWiki through 1.37, blocked IP addresses are allowed to edit EntitySchema items.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T296578 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/Iac86cf63bd014ef99e83dccfce9b8942e15d2bf9 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/Id9af124427bcd1e85301d2140a38bf47bbc5622c | x_refsource_MISC | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7JNQA53K675TQBBJPZRAG5ZT6XES3IS/ | vendor-advisory, x_refsource_FEDORA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:39:21.138Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T296578" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/Iac86cf63bd014ef99e83dccfce9b8942e15d2bf9" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/Id9af124427bcd1e85301d2140a38bf47bbc5622c" }, { "name": "FEDORA-2021-bef1126908", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7JNQA53K675TQBBJPZRAG5ZT6XES3IS/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In MediaWiki through 1.37, blocked IP addresses are allowed to edit EntitySchema items." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-08T02:06:12", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T296578" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/Iac86cf63bd014ef99e83dccfce9b8942e15d2bf9" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/Id9af124427bcd1e85301d2140a38bf47bbc5622c" }, { "name": "FEDORA-2021-bef1126908", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7JNQA53K675TQBBJPZRAG5ZT6XES3IS/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-45471", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In MediaWiki through 1.37, blocked IP addresses are allowed to edit EntitySchema items." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T296578", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T296578" }, { "name": "https://gerrit.wikimedia.org/r/q/Iac86cf63bd014ef99e83dccfce9b8942e15d2bf9", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/Iac86cf63bd014ef99e83dccfce9b8942e15d2bf9" }, { "name": "https://gerrit.wikimedia.org/r/q/Id9af124427bcd1e85301d2140a38bf47bbc5622c", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/Id9af124427bcd1e85301d2140a38bf47bbc5622c" }, { "name": "FEDORA-2021-bef1126908", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7JNQA53K675TQBBJPZRAG5ZT6XES3IS/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-45471", "datePublished": "2021-12-24T01:04:20", "dateReserved": "2021-12-24T00:00:00", "dateUpdated": "2024-08-04T04:39:21.138Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-31550
Vulnerability from cvelistv5
Published
2021-04-22 02:30
Modified
2024-08-03 23:03
Severity ?
EPSS score ?
Summary
An issue was discovered in the CommentBox extension for MediaWiki through 1.35.2. Via crafted configuration variables, a malicious actor could introduce XSS payloads into various layers.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T270767 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Commentbox/+/651934/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:03:33.411Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T270767" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Commentbox/+/651934/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the CommentBox extension for MediaWiki through 1.35.2. Via crafted configuration variables, a malicious actor could introduce XSS payloads into various layers." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-22T02:30:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T270767" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Commentbox/+/651934/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-31550", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in the CommentBox extension for MediaWiki through 1.35.2. Via crafted configuration variables, a malicious actor could introduce XSS payloads into various layers." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T270767", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T270767" }, { "name": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Commentbox/+/651934/", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Commentbox/+/651934/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-31550", "datePublished": "2021-04-22T02:30:00", "dateReserved": "2021-04-22T00:00:00", "dateUpdated": "2024-08-03T23:03:33.411Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34750
Vulnerability from cvelistv5
Published
2022-06-28 12:20
Modified
2024-08-03 09:22
Severity ?
EPSS score ?
Summary
An issue was discovered in MediaWiki through 1.38.1. The lemma length of a Wikibase lexeme is currently capped at a thousand characters. Unfortunately, this length is not validated, allowing much larger lexemes to be created, which introduces various denial-of-service attack vectors within the Wikibase and WikibaseLexeme extensions. This is related to Special:NewLexeme and Special:NewProperty.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T308659 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/I8171bfef73e525d73efa60b407ce147130ea4742 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/Id89a9b08e40f075d2d422cafd03668dff3ce7fc9 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:22:09.260Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T308659" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/I8171bfef73e525d73efa60b407ce147130ea4742" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/Id89a9b08e40f075d2d422cafd03668dff3ce7fc9" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MediaWiki through 1.38.1. The lemma length of a Wikibase lexeme is currently capped at a thousand characters. Unfortunately, this length is not validated, allowing much larger lexemes to be created, which introduces various denial-of-service attack vectors within the Wikibase and WikibaseLexeme extensions. This is related to Special:NewLexeme and Special:NewProperty." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-28T12:20:42", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T308659" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/I8171bfef73e525d73efa60b407ce147130ea4742" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/Id89a9b08e40f075d2d422cafd03668dff3ce7fc9" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-34750", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in MediaWiki through 1.38.1. The lemma length of a Wikibase lexeme is currently capped at a thousand characters. Unfortunately, this length is not validated, allowing much larger lexemes to be created, which introduces various denial-of-service attack vectors within the Wikibase and WikibaseLexeme extensions. This is related to Special:NewLexeme and Special:NewProperty." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T308659", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T308659" }, { "name": "https://gerrit.wikimedia.org/r/q/I8171bfef73e525d73efa60b407ce147130ea4742", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/I8171bfef73e525d73efa60b407ce147130ea4742" }, { "name": "https://gerrit.wikimedia.org/r/q/Id89a9b08e40f075d2d422cafd03668dff3ce7fc9", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/Id89a9b08e40f075d2d422cafd03668dff3ce7fc9" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-34750", "datePublished": "2022-06-28T12:20:42", "dateReserved": "2022-06-28T00:00:00", "dateUpdated": "2024-08-03T09:22:09.260Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-42049
Vulnerability from cvelistv5
Published
2021-10-06 20:47
Modified
2024-08-04 03:22
Severity ?
EPSS score ?
Summary
An issue was discovered in the Translate extension in MediaWiki through 1.36.2. Oversighters cannot undo revisions or oversight on pages where they suppressed information (such as PII). This allows oversighters to whitewash revisions.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T286884 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/I4d95220ef414337147235f7ebedc9b945c3348e3 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:22:25.639Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T286884" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/I4d95220ef414337147235f7ebedc9b945c3348e3" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the Translate extension in MediaWiki through 1.36.2. Oversighters cannot undo revisions or oversight on pages where they suppressed information (such as PII). This allows oversighters to whitewash revisions." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-29T16:39:17", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T286884" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/I4d95220ef414337147235f7ebedc9b945c3348e3" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-42049", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in the Translate extension in MediaWiki through 1.36.2. Oversighters cannot undo revisions or oversight on pages where they suppressed information (such as PII). This allows oversighters to whitewash revisions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T286884", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T286884" }, { "name": "https://gerrit.wikimedia.org/r/q/I4d95220ef414337147235f7ebedc9b945c3348e3", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/I4d95220ef414337147235f7ebedc9b945c3348e3" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-42049", "datePublished": "2021-10-06T20:47:00", "dateReserved": "2021-10-06T00:00:00", "dateUpdated": "2024-08-04T03:22:25.639Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22911
Vulnerability from cvelistv5
Published
2023-01-10 00:00
Modified
2024-08-02 10:20
Severity ?
EPSS score ?
Summary
An issue was discovered in MediaWiki before 1.35.9, 1.36.x through 1.38.x before 1.38.5, and 1.39.x before 1.39.1. E-Widgets does widget replacement in HTML attributes, which can lead to XSS, because widget authors often do not expect that their widget is executed in an HTML attribute context.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:20:31.462Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T149488" }, { "name": "FEDORA-2023-30a7a812f0", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AP65YEN762IBNQPOYGUVLTQIDLM5XD2A/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MediaWiki before 1.35.9, 1.36.x through 1.38.x before 1.38.5, and 1.39.x before 1.39.1. E-Widgets does widget replacement in HTML attributes, which can lead to XSS, because widget authors often do not expect that their widget is executed in an HTML attribute context." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-27T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T149488" }, { "name": "FEDORA-2023-30a7a812f0", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AP65YEN762IBNQPOYGUVLTQIDLM5XD2A/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-22911", "datePublished": "2023-01-10T00:00:00", "dateReserved": "2023-01-10T00:00:00", "dateUpdated": "2024-08-02T10:20:31.462Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-36674
Vulnerability from cvelistv5
Published
2023-08-20 00:00
Modified
2024-10-08 14:27
Severity ?
EPSS score ?
Summary
An issue was discovered in MediaWiki before 1.35.11, 1.36.x through 1.38.x before 1.38.7, 1.39.x before 1.39.4, and 1.40.x before 1.40.1. It is possible to bypass the Bad image list (aka badFile) by using the thumb parameter (aka Manualthumb) of the File syntax.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:52:54.118Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T335612" }, { "name": "FEDORA-2023-1fcaba0998", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DOAXEGYBOEM4JWB4J3BDH73NK2LCYC3O/" }, { "name": "FEDORA-2023-d8ae3c122e", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UIVGYECQGTUC2LLPVCZBPDLCTOHL2F6/" }, { "name": "FEDORA-2023-7e9d6015f6", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CHRX6DSLAMVXCV2YMJEWOLTBEYSESE5/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-36674", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-08T14:27:32.840293Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-08T14:27:38.887Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MediaWiki before 1.35.11, 1.36.x through 1.38.x before 1.38.7, 1.39.x before 1.39.4, and 1.40.x before 1.40.1. It is possible to bypass the Bad image list (aka badFile) by using the thumb parameter (aka Manualthumb) of the File syntax." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-15T20:06:47.791631", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T335612" }, { "name": "FEDORA-2023-1fcaba0998", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DOAXEGYBOEM4JWB4J3BDH73NK2LCYC3O/" }, { "name": "FEDORA-2023-d8ae3c122e", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UIVGYECQGTUC2LLPVCZBPDLCTOHL2F6/" }, { "name": "FEDORA-2023-7e9d6015f6", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CHRX6DSLAMVXCV2YMJEWOLTBEYSESE5/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-36674", "datePublished": "2023-08-20T00:00:00", "dateReserved": "2023-06-26T00:00:00", "dateUpdated": "2024-10-08T14:27:38.887Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-0894
Vulnerability from cvelistv5
Published
2007-02-12 23:00
Modified
2024-08-07 12:34
Severity ?
EPSS score ?
Summary
MediaWiki before 1.9.2 allows remote attackers to obtain sensitive information via a direct request to (1) Simple.deps.php, (2) MonoBook.deps.php, (3) MySkin.deps.php, or (4) Chick.deps.php in wiki/skins, which shows the installation path in the resulting error message.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/archive/1/459793/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://osvdb.org/33708 | vdb-entry, x_refsource_OSVDB | |
http://zone14.free.fr/advisories/7/ | x_refsource_MISC | |
http://bugzilla.wikimedia.org/show_bug.cgi?id=8819 | x_refsource_CONFIRM | |
http://osvdb.org/33706 | vdb-entry, x_refsource_OSVDB | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/32440 | vdb-entry, x_refsource_XF | |
http://svn.wikimedia.org/viewvc/mediawiki?view=rev&revision=19681 | x_refsource_CONFIRM | |
http://osvdb.org/33707 | vdb-entry, x_refsource_OSVDB | |
http://osvdb.org/33709 | vdb-entry, x_refsource_OSVDB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T12:34:21.192Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20070211 MediaWiki Full Path Disclosure Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/459793/100/0/threaded" }, { "name": "33708", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/33708" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://zone14.free.fr/advisories/7/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugzilla.wikimedia.org/show_bug.cgi?id=8819" }, { "name": "33706", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/33706" }, { "name": "mediawiki-multiple-scripts-path-disclosure(32440)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32440" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.wikimedia.org/viewvc/mediawiki?view=rev\u0026revision=19681" }, { "name": "33707", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/33707" }, { "name": "33709", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/33709" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-01-29T00:00:00", "descriptions": [ { "lang": "en", "value": "MediaWiki before 1.9.2 allows remote attackers to obtain sensitive information via a direct request to (1) Simple.deps.php, (2) MonoBook.deps.php, (3) MySkin.deps.php, or (4) Chick.deps.php in wiki/skins, which shows the installation path in the resulting error message." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20070211 MediaWiki Full Path Disclosure Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/459793/100/0/threaded" }, { "name": "33708", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/33708" }, { "tags": [ "x_refsource_MISC" ], "url": "http://zone14.free.fr/advisories/7/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugzilla.wikimedia.org/show_bug.cgi?id=8819" }, { "name": "33706", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/33706" }, { "name": "mediawiki-multiple-scripts-path-disclosure(32440)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32440" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.wikimedia.org/viewvc/mediawiki?view=rev\u0026revision=19681" }, { "name": "33707", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/33707" }, { "name": "33709", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/33709" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-0894", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MediaWiki before 1.9.2 allows remote attackers to obtain sensitive information via a direct request to (1) Simple.deps.php, (2) MonoBook.deps.php, (3) MySkin.deps.php, or (4) Chick.deps.php in wiki/skins, which shows the installation path in the resulting error message." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20070211 MediaWiki Full Path Disclosure Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/459793/100/0/threaded" }, { "name": "33708", "refsource": "OSVDB", "url": "http://osvdb.org/33708" }, { "name": "http://zone14.free.fr/advisories/7/", "refsource": "MISC", "url": "http://zone14.free.fr/advisories/7/" }, { "name": "http://bugzilla.wikimedia.org/show_bug.cgi?id=8819", "refsource": "CONFIRM", "url": "http://bugzilla.wikimedia.org/show_bug.cgi?id=8819" }, { "name": "33706", "refsource": "OSVDB", "url": "http://osvdb.org/33706" }, { "name": "mediawiki-multiple-scripts-path-disclosure(32440)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32440" }, { "name": "http://svn.wikimedia.org/viewvc/mediawiki?view=rev\u0026revision=19681", "refsource": "CONFIRM", "url": "http://svn.wikimedia.org/viewvc/mediawiki?view=rev\u0026revision=19681" }, { "name": "33707", "refsource": "OSVDB", "url": "http://osvdb.org/33707" }, { "name": "33709", "refsource": "OSVDB", "url": "http://osvdb.org/33709" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-0894", "datePublished": "2007-02-12T23:00:00", "dateReserved": "2007-02-12T00:00:00", "dateUpdated": "2024-08-07T12:34:21.192Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-0372
Vulnerability from cvelistv5
Published
2018-04-13 16:00
Modified
2024-09-16 16:27
Severity ?
EPSS score ?
Summary
Parameters injection in the SyntaxHighlight extension of Mediawiki before 1.23.16, 1.27.3 and 1.28.2 might result in multiple vulnerabilities.
References
▼ | URL | Tags |
---|---|---|
https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html | mailing-list, x_refsource_MLIST | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000209.html | mailing-list, x_refsource_MLIST | |
https://bugs.debian.org/861585 | x_refsource_MISC | |
https://phabricator.wikimedia.org/T158689 | x_refsource_CONFIRM | |
https://security-tracker.debian.org/tracker/CVE-2017-0372 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | mediawiki | mediawiki (SyntaxHighlight extension) |
Version: n/a |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T13:03:57.018Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[mediawiki-announce] 20170406 Security Release: 1.28.1 / 1.27.2 / 1.23.16", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html" }, { "name": "[mediawiki-announce] 20170430 Security release 1.27.3 and 1.28.2", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000209.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugs.debian.org/861585" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T158689" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security-tracker.debian.org/tracker/CVE-2017-0372" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "mediawiki (SyntaxHighlight extension)", "vendor": "mediawiki", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-04-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Parameters injection in the SyntaxHighlight extension of Mediawiki before 1.23.16, 1.27.3 and 1.28.2 might result in multiple vulnerabilities." } ], "problemTypes": [ { "descriptions": [ { "description": "parameter injection", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-04-13T15:57:01", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "name": "[mediawiki-announce] 20170406 Security Release: 1.28.1 / 1.27.2 / 1.23.16", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html" }, { "name": "[mediawiki-announce] 20170430 Security release 1.27.3 and 1.28.2", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000209.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugs.debian.org/861585" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T158689" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security-tracker.debian.org/tracker/CVE-2017-0372" } ], "source": { "advisory": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html", "discovery": "UNKNOWN" }, "title": "Parameters injection in SyntaxHighlight results in multiple vulnerabilities", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "DATE_PUBLIC": "2017-04-06T20:49:00.000Z", "ID": "CVE-2017-0372", "STATE": "PUBLIC", "TITLE": "Parameters injection in SyntaxHighlight results in multiple vulnerabilities" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "mediawiki (SyntaxHighlight extension)", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "mediawiki" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Parameters injection in the SyntaxHighlight extension of Mediawiki before 1.23.16, 1.27.3 and 1.28.2 might result in multiple vulnerabilities." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "parameter injection" } ] } ] }, "references": { "reference_data": [ { "name": "[mediawiki-announce] 20170406 Security Release: 1.28.1 / 1.27.2 / 1.23.16", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html" }, { "name": "[mediawiki-announce] 20170430 Security release 1.27.3 and 1.28.2", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000209.html" }, { "name": "https://bugs.debian.org/861585", "refsource": "MISC", "url": "https://bugs.debian.org/861585" }, { "name": "https://phabricator.wikimedia.org/T158689", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T158689" }, { "name": "https://security-tracker.debian.org/tracker/CVE-2017-0372", "refsource": "CONFIRM", "url": "https://security-tracker.debian.org/tracker/CVE-2017-0372" } ] }, "source": { "advisory": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2017-0372", "datePublished": "2018-04-13T16:00:00Z", "dateReserved": "2016-11-29T00:00:00", "dateUpdated": "2024-09-16T16:27:46.256Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-0322
Vulnerability from cvelistv5
Published
2006-01-19 21:00
Modified
2024-08-07 16:34
Severity ?
EPSS score ?
Summary
Unspecified vulnerability the edit comment formatting functionality in MediaWiki 1.5.x before 1.5.6 and 1.4.x before 1.4.14 allows attackers to cause a denial of service (infinite loop) via "certain malformed links."
References
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2006/0392 | vdb-entry, x_refsource_VUPEN | |
http://lists.suse.com/archive/suse-security-announce/2006-Feb/0001.html | vendor-advisory, x_refsource_SUSE | |
http://sourceforge.net/project/shownotes.php?release_id=386609 | x_refsource_CONFIRM | |
http://secunia.com/advisories/18717 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/24478 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/18711 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T16:34:13.580Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2006-0392", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/0392" }, { "name": "SUSE-SR:2006:003", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.suse.com/archive/suse-security-announce/2006-Feb/0001.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sourceforge.net/project/shownotes.php?release_id=386609" }, { "name": "18717", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18717" }, { "name": "mediawiki-comment-format-dos(24478)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24478" }, { "name": "18711", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18711" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-01-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability the edit comment formatting functionality in MediaWiki 1.5.x before 1.5.6 and 1.4.x before 1.4.14 allows attackers to cause a denial of service (infinite loop) via \"certain malformed links.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2006-0392", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/0392" }, { "name": "SUSE-SR:2006:003", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.suse.com/archive/suse-security-announce/2006-Feb/0001.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sourceforge.net/project/shownotes.php?release_id=386609" }, { "name": "18717", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18717" }, { "name": "mediawiki-comment-format-dos(24478)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24478" }, { "name": "18711", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18711" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-0322", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability the edit comment formatting functionality in MediaWiki 1.5.x before 1.5.6 and 1.4.x before 1.4.14 allows attackers to cause a denial of service (infinite loop) via \"certain malformed links.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2006-0392", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/0392" }, { "name": "SUSE-SR:2006:003", "refsource": "SUSE", "url": "http://lists.suse.com/archive/suse-security-announce/2006-Feb/0001.html" }, { "name": "http://sourceforge.net/project/shownotes.php?release_id=386609", "refsource": "CONFIRM", "url": "http://sourceforge.net/project/shownotes.php?release_id=386609" }, { "name": "18717", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18717" }, { "name": "mediawiki-comment-format-dos(24478)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24478" }, { "name": "18711", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18711" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-0322", "datePublished": "2006-01-19T21:00:00", "dateReserved": "2006-01-19T00:00:00", "dateUpdated": "2024-08-07T16:34:13.580Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-10960
Vulnerability from cvelistv5
Published
2020-04-03 14:13
Modified
2024-08-04 11:21
Severity ?
EPSS score ?
Summary
In MediaWiki before 1.34.1, users can add various Cascading Style Sheets (CSS) classes (which can affect what content is shown or hidden in the user interface) to arbitrary DOM nodes via HTML content within a MediaWiki page. This occurs because jquery.makeCollapsible allows applying an event handler to any Cascading Style Sheets (CSS) selector. There is no known way to exploit this for cross-site scripting (XSS).
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T246602 | x_refsource_CONFIRM | |
https://lists.wikimedia.org/pipermail/wikitech-l/2020-March/093243.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:21:14.164Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T246602" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2020-March/093243.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-03-26T00:00:00", "descriptions": [ { "lang": "en", "value": "In MediaWiki before 1.34.1, users can add various Cascading Style Sheets (CSS) classes (which can affect what content is shown or hidden in the user interface) to arbitrary DOM nodes via HTML content within a MediaWiki page. This occurs because jquery.makeCollapsible allows applying an event handler to any Cascading Style Sheets (CSS) selector. There is no known way to exploit this for cross-site scripting (XSS)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-03T14:13:52", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T246602" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2020-March/093243.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-10960", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In MediaWiki before 1.34.1, users can add various Cascading Style Sheets (CSS) classes (which can affect what content is shown or hidden in the user interface) to arbitrary DOM nodes via HTML content within a MediaWiki page. This occurs because jquery.makeCollapsible allows applying an event handler to any Cascading Style Sheets (CSS) selector. There is no known way to exploit this for cross-site scripting (XSS)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T246602", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T246602" }, { "name": "https://lists.wikimedia.org/pipermail/wikitech-l/2020-March/093243.html", "refsource": "CONFIRM", "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2020-March/093243.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-10960", "datePublished": "2020-04-03T14:13:52", "dateReserved": "2020-03-25T00:00:00", "dateUpdated": "2024-08-04T11:21:14.164Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-35478
Vulnerability from cvelistv5
Published
2020-12-18 07:33
Modified
2024-08-04 17:02
Severity ?
EPSS score ?
Summary
MediaWiki before 1.35.1 allows XSS via BlockLogFormatter.php. MediaWiki:blanknamespace potentially can be output as raw HTML with SCRIPT tags via LogFormatter::makePageLink(). This affects MediaWiki 1.33.0 and later.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T268938 | x_refsource_MISC | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2020-December/000268.html | x_refsource_MISC | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STT5Z4A3BCXVH3WIPICWU2FP4IPIMUPC/ | vendor-advisory, x_refsource_FEDORA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:02:08.103Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T268938" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2020-December/000268.html" }, { "name": "FEDORA-2020-0be2d40e13", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STT5Z4A3BCXVH3WIPICWU2FP4IPIMUPC/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "MediaWiki before 1.35.1 allows XSS via BlockLogFormatter.php. MediaWiki:blanknamespace potentially can be output as raw HTML with SCRIPT tags via LogFormatter::makePageLink(). This affects MediaWiki 1.33.0 and later." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-27T03:06:12", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T268938" }, { "tags": [ "x_refsource_MISC" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2020-December/000268.html" }, { "name": "FEDORA-2020-0be2d40e13", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STT5Z4A3BCXVH3WIPICWU2FP4IPIMUPC/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-35478", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MediaWiki before 1.35.1 allows XSS via BlockLogFormatter.php. MediaWiki:blanknamespace potentially can be output as raw HTML with SCRIPT tags via LogFormatter::makePageLink(). This affects MediaWiki 1.33.0 and later." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T268938", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T268938" }, { "name": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2020-December/000268.html", "refsource": "MISC", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2020-December/000268.html" }, { "name": "FEDORA-2020-0be2d40e13", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STT5Z4A3BCXVH3WIPICWU2FP4IPIMUPC/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-35478", "datePublished": "2020-12-18T07:33:43", "dateReserved": "2020-12-16T00:00:00", "dateUpdated": "2024-08-04T17:02:08.103Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-0460
Vulnerability from cvelistv5
Published
2008-01-25 15:00
Modified
2024-08-07 07:46
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in api.php in (1) MediaWiki 1.11 through 1.11.0rc1, 1.10 through 1.10.2, 1.9 through 1.9.4, and 1.8; and (2) the BotQuery extension for MediaWiki 1.7 and earlier; when Internet Explorer is used, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/39901 | vdb-entry, x_refsource_XF | |
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00189.html | vendor-advisory, x_refsource_FEDORA | |
http://www.vupen.com/english/advisories/2008/0280 | vdb-entry, x_refsource_VUPEN | |
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00147.html | vendor-advisory, x_refsource_FEDORA | |
http://www.securityfocus.com/bid/28137 | vdb-entry, x_refsource_BID | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2008-January/000068.html | mailing-list, x_refsource_MLIST | |
http://secunia.com/advisories/28629 | third-party-advisory, x_refsource_SECUNIA | |
http://secunia.com/advisories/29266 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T07:46:54.584Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "mediawiki-api-xss(39901)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39901" }, { "name": "FEDORA-2008-2288", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00189.html" }, { "name": "ADV-2008-0280", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0280" }, { "name": "FEDORA-2008-2245", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00147.html" }, { "name": "28137", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28137" }, { "name": "[MediaWiki-announce] 20080124 MediaWiki 1.11.1, 1.10.3, 1.9.5 released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2008-January/000068.html" }, { "name": "28629", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28629" }, { "name": "29266", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29266" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-01-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in api.php in (1) MediaWiki 1.11 through 1.11.0rc1, 1.10 through 1.10.2, 1.9 through 1.9.4, and 1.8; and (2) the BotQuery extension for MediaWiki 1.7 and earlier; when Internet Explorer is used, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-07T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "mediawiki-api-xss(39901)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39901" }, { "name": "FEDORA-2008-2288", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00189.html" }, { "name": "ADV-2008-0280", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0280" }, { "name": "FEDORA-2008-2245", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00147.html" }, { "name": "28137", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28137" }, { "name": "[MediaWiki-announce] 20080124 MediaWiki 1.11.1, 1.10.3, 1.9.5 released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2008-January/000068.html" }, { "name": "28629", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28629" }, { "name": "29266", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29266" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-0460", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in api.php in (1) MediaWiki 1.11 through 1.11.0rc1, 1.10 through 1.10.2, 1.9 through 1.9.4, and 1.8; and (2) the BotQuery extension for MediaWiki 1.7 and earlier; when Internet Explorer is used, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "mediawiki-api-xss(39901)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39901" }, { "name": "FEDORA-2008-2288", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00189.html" }, { "name": "ADV-2008-0280", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0280" }, { "name": "FEDORA-2008-2245", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00147.html" }, { "name": "28137", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28137" }, { "name": "[MediaWiki-announce] 20080124 MediaWiki 1.11.1, 1.10.3, 1.9.5 released", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2008-January/000068.html" }, { "name": "28629", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28629" }, { "name": "29266", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29266" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-0460", "datePublished": "2008-01-25T15:00:00", "dateReserved": "2008-01-25T00:00:00", "dateUpdated": "2024-08-07T07:46:54.584Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-42043
Vulnerability from cvelistv5
Published
2021-10-06 20:28
Modified
2024-08-04 03:22
Severity ?
EPSS score ?
Summary
An issue was discovered in Special:MediaSearch in the MediaSearch extension in MediaWiki through 1.36.2. The suggestion text (a parameter to mediasearch-did-you-mean) was not being properly sanitized and allowed for the injection and execution of HTML and JavaScript via the intitle: search operator within the query.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T291600 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/If64eb5842237c92290d07ebc3fe14710d9de3fc2 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:22:25.656Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T291600" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/If64eb5842237c92290d07ebc3fe14710d9de3fc2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Special:MediaSearch in the MediaSearch extension in MediaWiki through 1.36.2. The suggestion text (a parameter to mediasearch-did-you-mean) was not being properly sanitized and allowed for the injection and execution of HTML and JavaScript via the intitle: search operator within the query." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-06T20:28:20", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T291600" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/If64eb5842237c92290d07ebc3fe14710d9de3fc2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-42043", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Special:MediaSearch in the MediaSearch extension in MediaWiki through 1.36.2. The suggestion text (a parameter to mediasearch-did-you-mean) was not being properly sanitized and allowed for the injection and execution of HTML and JavaScript via the intitle: search operator within the query." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T291600", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T291600" }, { "name": "https://gerrit.wikimedia.org/r/q/If64eb5842237c92290d07ebc3fe14710d9de3fc2", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/If64eb5842237c92290d07ebc3fe14710d9de3fc2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-42043", "datePublished": "2021-10-06T20:28:20", "dateReserved": "2021-10-06T00:00:00", "dateUpdated": "2024-08-04T03:22:25.656Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2005-1245
Vulnerability from cvelistv5
Published
2005-04-24 04:00
Modified
2024-08-07 21:44
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in MediaWiki before 1.4.2, when using HTML Tidy ($wgUseTidy), allows remote attackers to inject arbitrary web script or HTML via unknown vectors.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/20210 | vdb-entry, x_refsource_XF | |
http://www.osvdb.org/15719 | vdb-entry, x_refsource_OSVDB | |
http://secunia.com/advisories/14993 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/13301 | vdb-entry, x_refsource_BID | |
http://sourceforge.net/project/shownotes.php?release_id=322146 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T21:44:05.450Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "mediawiki-unknown-xss(20210)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20210" }, { "name": "15719", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/15719" }, { "name": "14993", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/14993" }, { "name": "13301", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/13301" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sourceforge.net/project/shownotes.php?release_id=322146" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-04-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in MediaWiki before 1.4.2, when using HTML Tidy ($wgUseTidy), allows remote attackers to inject arbitrary web script or HTML via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "mediawiki-unknown-xss(20210)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20210" }, { "name": "15719", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/15719" }, { "name": "14993", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/14993" }, { "name": "13301", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/13301" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sourceforge.net/project/shownotes.php?release_id=322146" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-1245", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in MediaWiki before 1.4.2, when using HTML Tidy ($wgUseTidy), allows remote attackers to inject arbitrary web script or HTML via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "mediawiki-unknown-xss(20210)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20210" }, { "name": "15719", "refsource": "OSVDB", "url": "http://www.osvdb.org/15719" }, { "name": "14993", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/14993" }, { "name": "13301", "refsource": "BID", "url": "http://www.securityfocus.com/bid/13301" }, { "name": "http://sourceforge.net/project/shownotes.php?release_id=322146", "refsource": "CONFIRM", "url": "http://sourceforge.net/project/shownotes.php?release_id=322146" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-1245", "datePublished": "2005-04-24T04:00:00", "dateReserved": "2005-04-24T00:00:00", "dateUpdated": "2024-08-07T21:44:05.450Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-40604
Vulnerability from cvelistv5
Published
2024-07-06 00:00
Modified
2024-08-02 04:33
Severity ?
EPSS score ?
Summary
An issue was discovered in the Nimbus skin for MediaWiki through 1.42.1. There is Stored XSS via MediaWiki:Nimbus-sidebar menu and submenu entries.
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-40604", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-08T13:06:31.585093Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-08T13:06:43.501Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T04:33:11.815Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T361450" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the Nimbus skin for MediaWiki through 1.42.1. There is Stored XSS via MediaWiki:Nimbus-sidebar menu and submenu entries." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-06T23:27:14.251104", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T361450" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-40604", "datePublished": "2024-07-06T00:00:00", "dateReserved": "2024-07-06T00:00:00", "dateUpdated": "2024-08-02T04:33:11.815Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-30156
Vulnerability from cvelistv5
Published
2021-04-09 06:10
Modified
2024-08-03 22:24
Severity ?
EPSS score ?
Summary
An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. Special:Contributions can leak that a "hidden" user exists.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T276306 | x_refsource_MISC | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/26UJGHF7LJDOCQN6A3Z4PM7PYRKENJHE/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2OMSV7B2TCFBOCICN3B4SMQP5HVRJQIT/ | vendor-advisory, x_refsource_FEDORA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T22:24:59.679Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T276306" }, { "name": "FEDORA-2021-f4223b6684", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/26UJGHF7LJDOCQN6A3Z4PM7PYRKENJHE/" }, { "name": "FEDORA-2021-d298103d3a", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2OMSV7B2TCFBOCICN3B4SMQP5HVRJQIT/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. Special:Contributions can leak that a \"hidden\" user exists." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-24T22:06:29", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T276306" }, { "name": "FEDORA-2021-f4223b6684", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/26UJGHF7LJDOCQN6A3Z4PM7PYRKENJHE/" }, { "name": "FEDORA-2021-d298103d3a", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2OMSV7B2TCFBOCICN3B4SMQP5HVRJQIT/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-30156", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. Special:Contributions can leak that a \"hidden\" user exists." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T276306", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T276306" }, { "name": "FEDORA-2021-f4223b6684", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/26UJGHF7LJDOCQN6A3Z4PM7PYRKENJHE/" }, { "name": "FEDORA-2021-d298103d3a", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2OMSV7B2TCFBOCICN3B4SMQP5HVRJQIT/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-30156", "datePublished": "2021-04-09T06:10:16", "dateReserved": "2021-04-06T00:00:00", "dateUpdated": "2024-08-03T22:24:59.679Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-4570
Vulnerability from cvelistv5
Published
2014-05-12 14:00
Modified
2024-08-06 16:45
Severity ?
EPSS score ?
Summary
The zend_inline_hash_func function in php-luasandbox in the Scribuntu extension for MediaWiki before 1.19.10, 1.2x before 1.21.4, and 1.22.x before 1.22.1 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to converting Lua data structures to PHP, as demonstrated by passing { [{}] = 1 } to a module function.
References
▼ | URL | Tags |
---|---|---|
http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000138.html | mailing-list, x_refsource_MLIST | |
https://bugzilla.wikimedia.org/show_bug.cgi?id=54527 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:45:15.054Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[MediaWiki-announce] 20140114 MediaWiki Security Releases: 1.22.1, 1.21.4 and 1.19.10", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000138.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=54527" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-01-14T00:00:00", "descriptions": [ { "lang": "en", "value": "The zend_inline_hash_func function in php-luasandbox in the Scribuntu extension for MediaWiki before 1.19.10, 1.2x before 1.21.4, and 1.22.x before 1.22.1 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to converting Lua data structures to PHP, as demonstrated by passing { [{}] = 1 } to a module function." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-05-12T13:57:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[MediaWiki-announce] 20140114 MediaWiki Security Releases: 1.22.1, 1.21.4 and 1.19.10", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000138.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=54527" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4570", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The zend_inline_hash_func function in php-luasandbox in the Scribuntu extension for MediaWiki before 1.19.10, 1.2x before 1.21.4, and 1.22.x before 1.22.1 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to converting Lua data structures to PHP, as demonstrated by passing { [{}] = 1 } to a module function." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[MediaWiki-announce] 20140114 MediaWiki Security Releases: 1.22.1, 1.21.4 and 1.19.10", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000138.html" }, { "name": "https://bugzilla.wikimedia.org/show_bug.cgi?id=54527", "refsource": "CONFIRM", "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=54527" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-4570", "datePublished": "2014-05-12T14:00:00", "dateReserved": "2013-06-12T00:00:00", "dateUpdated": "2024-08-06T16:45:15.054Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-45373
Vulnerability from cvelistv5
Published
2023-10-09 00:00
Modified
2024-09-19 17:45
Severity ?
EPSS score ?
Summary
An issue was discovered in the ProofreadPage extension for MediaWiki before 1.35.12, 1.36.x through 1.39.x before 1.39.5, and 1.40.x before 1.40.1. XSS can occur via formatNumNoSeparators.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:21:16.029Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T345693" }, { "tags": [ "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/ProofreadPage/+/961262" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-45373", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-19T17:45:51.126266Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-19T17:45:59.383Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the ProofreadPage extension for MediaWiki before 1.35.12, 1.36.x through 1.39.x before 1.39.5, and 1.40.x before 1.40.1. XSS can occur via formatNumNoSeparators." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-09T05:32:30.576234", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T345693" }, { "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/ProofreadPage/+/961262" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-45373", "datePublished": "2023-10-09T00:00:00", "dateReserved": "2023-10-09T00:00:00", "dateUpdated": "2024-09-19T17:45:59.383Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-2152
Vulnerability from cvelistv5
Published
2005-07-01 04:00
Modified
2024-08-08 01:15
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in 'raw' page output mode for MediaWiki 1.3.4 and earlier allows remote attackers to inject arbitrary web script or HTML.
References
▼ | URL | Tags |
---|---|---|
http://sourceforge.net/project/shownotes.php?group_id=34373&release_id=271848 | x_refsource_CONFIRM | |
http://secunia.com/advisories/12692/ | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17578 | vdb-entry, x_refsource_XF | |
http://www.osvdb.org/10454 | vdb-entry, x_refsource_OSVDB | |
http://www.securityfocus.com/bid/11302 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T01:15:01.607Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sourceforge.net/project/shownotes.php?group_id=34373\u0026release_id=271848" }, { "name": "12692", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/12692/" }, { "name": "mediawiki-raw-output-xss(17578)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17578" }, { "name": "10454", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/10454" }, { "name": "11302", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/11302" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-09-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in \u0027raw\u0027 page output mode for MediaWiki 1.3.4 and earlier allows remote attackers to inject arbitrary web script or HTML." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sourceforge.net/project/shownotes.php?group_id=34373\u0026release_id=271848" }, { "name": "12692", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/12692/" }, { "name": "mediawiki-raw-output-xss(17578)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17578" }, { "name": "10454", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/10454" }, { "name": "11302", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/11302" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-2152", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in \u0027raw\u0027 page output mode for MediaWiki 1.3.4 and earlier allows remote attackers to inject arbitrary web script or HTML." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://sourceforge.net/project/shownotes.php?group_id=34373\u0026release_id=271848", "refsource": "CONFIRM", "url": "http://sourceforge.net/project/shownotes.php?group_id=34373\u0026release_id=271848" }, { "name": "12692", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/12692/" }, { "name": "mediawiki-raw-output-xss(17578)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17578" }, { "name": "10454", "refsource": "OSVDB", "url": "http://www.osvdb.org/10454" }, { "name": "11302", "refsource": "BID", "url": "http://www.securityfocus.com/bid/11302" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-2152", "datePublished": "2005-07-01T04:00:00", "dateReserved": "2005-07-01T00:00:00", "dateUpdated": "2024-08-08T01:15:01.607Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-1405
Vulnerability from cvelistv5
Published
2005-02-12 05:00
Modified
2024-08-08 00:53
Severity ?
EPSS score ?
Summary
MediaWiki 1.3.8 and earlier, when used with Apache mod_mime, does not properly handle files with two file extensions, such as .php.rar, which allows remote attackers to upload and execute arbitrary code.
References
▼ | URL | Tags |
---|---|---|
http://wikipedia.sourceforge.net/ | x_refsource_MISC | |
http://www.securityfocus.com/bid/11985 | vdb-entry, x_refsource_BID | |
http://marc.info/?l=bugtraq&m=110321710420059&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://secunia.com/advisories/13478/ | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:53:22.795Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://wikipedia.sourceforge.net/" }, { "name": "11985", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/11985" }, { "name": "20041216 STG Security Advisory: [SSA-20041215-19] Vulnerability of uploading files with multiple extensions in MediaWiki", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=110321710420059\u0026w=2" }, { "name": "13478", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/13478/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-12-16T00:00:00", "descriptions": [ { "lang": "en", "value": "MediaWiki 1.3.8 and earlier, when used with Apache mod_mime, does not properly handle files with two file extensions, such as .php.rar, which allows remote attackers to upload and execute arbitrary code." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-10-17T13:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://wikipedia.sourceforge.net/" }, { "name": "11985", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/11985" }, { "name": "20041216 STG Security Advisory: [SSA-20041215-19] Vulnerability of uploading files with multiple extensions in MediaWiki", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=110321710420059\u0026w=2" }, { "name": "13478", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/13478/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-1405", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MediaWiki 1.3.8 and earlier, when used with Apache mod_mime, does not properly handle files with two file extensions, such as .php.rar, which allows remote attackers to upload and execute arbitrary code." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://wikipedia.sourceforge.net/", "refsource": "MISC", "url": "http://wikipedia.sourceforge.net/" }, { "name": "11985", "refsource": "BID", "url": "http://www.securityfocus.com/bid/11985" }, { "name": "20041216 STG Security Advisory: [SSA-20041215-19] Vulnerability of uploading files with multiple extensions in MediaWiki", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=110321710420059\u0026w=2" }, { "name": "13478", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/13478/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-1405", "datePublished": "2005-02-12T05:00:00", "dateReserved": "2005-02-12T00:00:00", "dateUpdated": "2024-08-08T00:53:22.795Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-0537
Vulnerability from cvelistv5
Published
2011-02-04 00:00
Modified
2024-08-06 21:58
Severity ?
EPSS score ?
Summary
Multiple directory traversal vulnerabilities in (1) languages/Language.php and (2) includes/StubObject.php in MediaWiki 1.8.0 and other versions before 1.16.2, when running on Windows and possibly Novell Netware, allow remote attackers to include and execute arbitrary local PHP files via vectors related to a crafted language file and the Language::factory function.
References
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2011/0273 | vdb-entry, x_refsource_VUPEN | |
http://osvdb.org/70799 | vdb-entry, x_refsource_OSVDB | |
https://bugzilla.wikimedia.org/show_bug.cgi?id=27094 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2011/02/03/3 | mailing-list, x_refsource_MLIST | |
http://download.wikimedia.org/mediawiki/1.16/mediawiki-1.16.2.patch.gz | x_refsource_MISC | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-February/000095.html | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2011/02/01/4 | mailing-list, x_refsource_MLIST | |
http://osvdb.org/70798 | vdb-entry, x_refsource_OSVDB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:58:25.094Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2011-0273", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0273" }, { "name": "70799", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/70799" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=27094" }, { "name": "[oss-security] 20110203 Re: CVE request: Server-side arbitrary script inclusion vulnerability in MediaWiki \u003c=1.16.1", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2011/02/03/3" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://download.wikimedia.org/mediawiki/1.16/mediawiki-1.16.2.patch.gz" }, { "name": "[MediaWiki-announce] 20110201 MediaWiki security release 1.16.2", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-February/000095.html" }, { "name": "[oss-security] 20110201 CVE request: Server-side arbitrary script inclusion vulnerability in MediaWiki \u003c=1.16.1", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2011/02/01/4" }, { "name": "70798", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/70798" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-01T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple directory traversal vulnerabilities in (1) languages/Language.php and (2) includes/StubObject.php in MediaWiki 1.8.0 and other versions before 1.16.2, when running on Windows and possibly Novell Netware, allow remote attackers to include and execute arbitrary local PHP files via vectors related to a crafted language file and the Language::factory function." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-02-12T10:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "ADV-2011-0273", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0273" }, { "name": "70799", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/70799" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=27094" }, { "name": "[oss-security] 20110203 Re: CVE request: Server-side arbitrary script inclusion vulnerability in MediaWiki \u003c=1.16.1", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2011/02/03/3" }, { "tags": [ "x_refsource_MISC" ], "url": "http://download.wikimedia.org/mediawiki/1.16/mediawiki-1.16.2.patch.gz" }, { "name": "[MediaWiki-announce] 20110201 MediaWiki security release 1.16.2", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-February/000095.html" }, { "name": "[oss-security] 20110201 CVE request: Server-side arbitrary script inclusion vulnerability in MediaWiki \u003c=1.16.1", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2011/02/01/4" }, { "name": "70798", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/70798" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-0537", "datePublished": "2011-02-04T00:00:00", "dateReserved": "2011-01-20T00:00:00", "dateUpdated": "2024-08-06T21:58:25.094Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-15005
Vulnerability from cvelistv5
Published
2020-06-24 22:07
Modified
2024-08-04 13:00
Severity ?
EPSS score ?
Summary
In MediaWiki before 1.31.8, 1.32.x and 1.33.x before 1.33.4, and 1.34.x before 1.34.2, private wikis behind a caching server using the img_auth.php image authorization security feature may have had their files cached publicly, so any unauthorized user could view them. This occurs because Cache-Control and Vary headers were mishandled.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T248947 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/plugins/gitiles/mediawiki/core/+/REL1_34/RELEASE-NOTES-1.34 | x_refsource_CONFIRM | |
https://gerrit.wikimedia.org/r/plugins/gitiles/mediawiki/core/+/REL1_33/RELEASE-NOTES-1.33 | x_refsource_CONFIRM | |
https://gerrit.wikimedia.org/r/plugins/gitiles/mediawiki/core/+/REL1_31/RELEASE-NOTES-1.31 | x_refsource_CONFIRM | |
https://lists.wikimedia.org/pipermail/wikitech-l/2020-June/093535.html | x_refsource_CONFIRM | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EEZIMLJMJS72SJXPYL736XMUAVCRQD2H/ | vendor-advisory, x_refsource_FEDORA | |
https://www.debian.org/security/2020/dsa-4767 | vendor-advisory, x_refsource_DEBIAN | |
https://lists.debian.org/debian-lts-announce/2020/12/msg00034.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T13:00:52.131Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T248947" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/plugins/gitiles/mediawiki/core/+/REL1_34/RELEASE-NOTES-1.34" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/plugins/gitiles/mediawiki/core/+/REL1_33/RELEASE-NOTES-1.33" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/plugins/gitiles/mediawiki/core/+/REL1_31/RELEASE-NOTES-1.31" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2020-June/093535.html" }, { "name": "FEDORA-2020-9c97633708", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EEZIMLJMJS72SJXPYL736XMUAVCRQD2H/" }, { "name": "DSA-4767", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2020/dsa-4767" }, { "name": "[debian-lts-announce] 20201223 [SECURITY] [DLA 2504-1] mediawiki security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00034.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In MediaWiki before 1.31.8, 1.32.x and 1.33.x before 1.33.4, and 1.34.x before 1.34.2, private wikis behind a caching server using the img_auth.php image authorization security feature may have had their files cached publicly, so any unauthorized user could view them. This occurs because Cache-Control and Vary headers were mishandled." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-23T03:06:09", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T248947" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://gerrit.wikimedia.org/r/plugins/gitiles/mediawiki/core/+/REL1_34/RELEASE-NOTES-1.34" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://gerrit.wikimedia.org/r/plugins/gitiles/mediawiki/core/+/REL1_33/RELEASE-NOTES-1.33" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://gerrit.wikimedia.org/r/plugins/gitiles/mediawiki/core/+/REL1_31/RELEASE-NOTES-1.31" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2020-June/093535.html" }, { "name": "FEDORA-2020-9c97633708", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EEZIMLJMJS72SJXPYL736XMUAVCRQD2H/" }, { "name": "DSA-4767", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2020/dsa-4767" }, { "name": "[debian-lts-announce] 20201223 [SECURITY] [DLA 2504-1] mediawiki security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00034.html" } ], "source": { "discovery": "INTERNAL" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-15005", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In MediaWiki before 1.31.8, 1.32.x and 1.33.x before 1.33.4, and 1.34.x before 1.34.2, private wikis behind a caching server using the img_auth.php image authorization security feature may have had their files cached publicly, so any unauthorized user could view them. This occurs because Cache-Control and Vary headers were mishandled." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T248947", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T248947" }, { "name": "https://gerrit.wikimedia.org/r/plugins/gitiles/mediawiki/core/+/REL1_34/RELEASE-NOTES-1.34", "refsource": "CONFIRM", "url": "https://gerrit.wikimedia.org/r/plugins/gitiles/mediawiki/core/+/REL1_34/RELEASE-NOTES-1.34" }, { "name": "https://gerrit.wikimedia.org/r/plugins/gitiles/mediawiki/core/+/REL1_33/RELEASE-NOTES-1.33", "refsource": "CONFIRM", "url": "https://gerrit.wikimedia.org/r/plugins/gitiles/mediawiki/core/+/REL1_33/RELEASE-NOTES-1.33" }, { "name": "https://gerrit.wikimedia.org/r/plugins/gitiles/mediawiki/core/+/REL1_31/RELEASE-NOTES-1.31", "refsource": "CONFIRM", "url": "https://gerrit.wikimedia.org/r/plugins/gitiles/mediawiki/core/+/REL1_31/RELEASE-NOTES-1.31" }, { "name": "https://lists.wikimedia.org/pipermail/wikitech-l/2020-June/093535.html", "refsource": "CONFIRM", "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2020-June/093535.html" }, { "name": "FEDORA-2020-9c97633708", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EEZIMLJMJS72SJXPYL736XMUAVCRQD2H/" }, { "name": "DSA-4767", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4767" }, { "name": "[debian-lts-announce] 20201223 [SECURITY] [DLA 2504-1] mediawiki security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00034.html" } ] }, "source": { "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-15005", "datePublished": "2020-06-24T22:07:37", "dateReserved": "2020-06-24T00:00:00", "dateUpdated": "2024-08-04T13:00:52.131Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-2933
Vulnerability from cvelistv5
Published
2015-04-13 14:00
Modified
2024-08-06 05:32
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in the Html class in MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2 allows remote attackers to inject arbitrary web script or HTML via a LanguageConverter substitution string when using a language variant.
References
▼ | URL | Tags |
---|---|---|
https://security.gentoo.org/glsa/201510-05 | vendor-advisory, x_refsource_GENTOO | |
http://www.mandriva.com/security/advisories?name=MDVSA-2015:200 | vendor-advisory, x_refsource_MANDRIVA | |
http://www.securityfocus.com/bid/73477 | vdb-entry, x_refsource_BID | |
http://www.openwall.com/lists/oss-security/2015/04/07/3 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2015/04/01/1 | mailing-list, x_refsource_MLIST | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html | mailing-list, x_refsource_MLIST | |
https://phabricator.wikimedia.org/T73394 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:32:21.039Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201510-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201510-05" }, { "name": "MDVSA-2015:200", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:200" }, { "name": "73477", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/73477" }, { "name": "[oss-security] 20150407 Re: CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/04/07/3" }, { "name": "[oss-security] 20150331 CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/04/01/1" }, { "name": "[MediaWiki-announce] 20150331 MediaWiki Security and Maintenance Releases: 1.19.24, 1.23.9, and 1.24.2", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T73394" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-03-31T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the Html class in MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2 allows remote attackers to inject arbitrary web script or HTML via a LanguageConverter substitution string when using a language variant." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-05T21:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "GLSA-201510-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201510-05" }, { "name": "MDVSA-2015:200", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:200" }, { "name": "73477", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/73477" }, { "name": "[oss-security] 20150407 Re: CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/04/07/3" }, { "name": "[oss-security] 20150331 CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/04/01/1" }, { "name": "[MediaWiki-announce] 20150331 MediaWiki Security and Maintenance Releases: 1.19.24, 1.23.9, and 1.24.2", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T73394" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-2933", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the Html class in MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2 allows remote attackers to inject arbitrary web script or HTML via a LanguageConverter substitution string when using a language variant." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201510-05", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201510-05" }, { "name": "MDVSA-2015:200", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:200" }, { "name": "73477", "refsource": "BID", "url": "http://www.securityfocus.com/bid/73477" }, { "name": "[oss-security] 20150407 Re: CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/04/07/3" }, { "name": "[oss-security] 20150331 CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/04/01/1" }, { "name": "[MediaWiki-announce] 20150331 MediaWiki Security and Maintenance Releases: 1.19.24, 1.23.9, and 1.24.2", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html" }, { "name": "https://phabricator.wikimedia.org/T73394", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T73394" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-2933", "datePublished": "2015-04-13T14:00:00", "dateReserved": "2015-04-07T00:00:00", "dateUpdated": "2024-08-06T05:32:21.039Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-4377
Vulnerability from cvelistv5
Published
2017-10-26 20:00
Modified
2024-08-06 20:35
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in MediaWiki before 1.18.5 and 1.19.x before 1.19.2 allows remote attackers to inject arbitrary web script or HTML via a File: link to a nonexistent image.
References
▼ | URL | Tags |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=853409 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2012/08/31/6 | mailing-list, x_refsource_MLIST | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2012-August/000119.html | mailing-list, x_refsource_MLIST | |
https://phabricator.wikimedia.org/T41700 | x_refsource_CONFIRM | |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330 | x_refsource_MISC | |
http://www.openwall.com/lists/oss-security/2012/08/31/10 | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:35:09.193Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853409" }, { "name": "[oss-security] 20120831 CVE Request -- MediaWiki 1.19.2 and 1.18.5 multiple security flaws", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/08/31/6" }, { "name": "[MediaWiki-announce] 20120831 MediaWiki security release: 1.19.2 and 1.18.5", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2012-August/000119.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T41700" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330" }, { "name": "[oss-security] 20120831 Re: CVE Request -- MediaWiki 1.19.2 and 1.18.5 multiple security flaws", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/08/31/10" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-08-31T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in MediaWiki before 1.18.5 and 1.19.x before 1.19.2 allows remote attackers to inject arbitrary web script or HTML via a File: link to a nonexistent image." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-26T19:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853409" }, { "name": "[oss-security] 20120831 CVE Request -- MediaWiki 1.19.2 and 1.18.5 multiple security flaws", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/08/31/6" }, { "name": "[MediaWiki-announce] 20120831 MediaWiki security release: 1.19.2 and 1.18.5", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2012-August/000119.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T41700" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330" }, { "name": "[oss-security] 20120831 Re: CVE Request -- MediaWiki 1.19.2 and 1.18.5 multiple security flaws", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/08/31/10" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-4377", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in MediaWiki before 1.18.5 and 1.19.x before 1.19.2 allows remote attackers to inject arbitrary web script or HTML via a File: link to a nonexistent image." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=853409", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853409" }, { "name": "[oss-security] 20120831 CVE Request -- MediaWiki 1.19.2 and 1.18.5 multiple security flaws", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2012/08/31/6" }, { "name": "[MediaWiki-announce] 20120831 MediaWiki security release: 1.19.2 and 1.18.5", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2012-August/000119.html" }, { "name": "https://phabricator.wikimedia.org/T41700", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T41700" }, { "name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330", "refsource": "MISC", "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330" }, { "name": "[oss-security] 20120831 Re: CVE Request -- MediaWiki 1.19.2 and 1.18.5 multiple security flaws", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2012/08/31/10" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-4377", "datePublished": "2017-10-26T20:00:00", "dateReserved": "2012-08-21T00:00:00", "dateUpdated": "2024-08-06T20:35:09.193Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-37301
Vulnerability from cvelistv5
Published
2023-06-30 00:00
Modified
2024-11-27 18:47
Severity ?
EPSS score ?
Summary
An issue was discovered in SubmitEntityAction in Wikibase in MediaWiki through 1.39.3. Because it doesn't use EditEntity for undo and restore, the intended interaction with AbuseFilter does not occur.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:09:34.087Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T250720" }, { "tags": [ "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Wikibase/+/933663" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-37301", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-27T18:46:21.372349Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-326", "description": "CWE-326 Inadequate Encryption Strength", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-27T18:47:20.839Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in SubmitEntityAction in Wikibase in MediaWiki through 1.39.3. Because it doesn\u0027t use EditEntity for undo and restore, the intended interaction with AbuseFilter does not occur." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-30T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T250720" }, { "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Wikibase/+/933663" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-37301", "datePublished": "2023-06-30T00:00:00", "dateReserved": "2023-06-30T00:00:00", "dateUpdated": "2024-11-27T18:47:20.839Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-9478
Vulnerability from cvelistv5
Published
2015-01-16 16:00
Modified
2024-08-06 13:47
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in the preview in the ExpandTemplates extension for MediaWiki, when $wgRawHTML is set to true, allows remote attackers to inject arbitrary web script or HTML via the wpInput parameter to the Special:ExpandTemplates page.
References
▼ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2015/01/03/13 | mailing-list, x_refsource_MLIST | |
https://phabricator.wikimedia.org/T73111 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2014/12/21/2 | mailing-list, x_refsource_MLIST | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-December/000173.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:47:40.998Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20150103 Re: CVE Request: Mediawiki security releases 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/01/03/13" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T73111" }, { "name": "[oss-security] 20141221 CVE Request: Mediawiki security releases 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/12/21/2" }, { "name": "[MediaWiki-announce] 20141217 MediaWiki Security and Maintenance Releases: 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-December/000173.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-12-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the preview in the ExpandTemplates extension for MediaWiki, when $wgRawHTML is set to true, allows remote attackers to inject arbitrary web script or HTML via the wpInput parameter to the Special:ExpandTemplates page." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-01-16T15:57:01", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "name": "[oss-security] 20150103 Re: CVE Request: Mediawiki security releases 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/01/03/13" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T73111" }, { "name": "[oss-security] 20141221 CVE Request: Mediawiki security releases 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/12/21/2" }, { "name": "[MediaWiki-announce] 20141217 MediaWiki Security and Maintenance Releases: 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-December/000173.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "ID": "CVE-2014-9478", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the preview in the ExpandTemplates extension for MediaWiki, when $wgRawHTML is set to true, allows remote attackers to inject arbitrary web script or HTML via the wpInput parameter to the Special:ExpandTemplates page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20150103 Re: CVE Request: Mediawiki security releases 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/01/03/13" }, { "name": "https://phabricator.wikimedia.org/T73111", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T73111" }, { "name": "[oss-security] 20141221 CVE Request: Mediawiki security releases 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/12/21/2" }, { "name": "[MediaWiki-announce] 20141217 MediaWiki Security and Maintenance Releases: 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-December/000173.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2014-9478", "datePublished": "2015-01-16T16:00:00", "dateReserved": "2015-01-03T00:00:00", "dateUpdated": "2024-08-06T13:47:40.998Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-4302
Vulnerability from cvelistv5
Published
2013-10-27 00:00
Modified
2024-08-06 16:38
Severity ?
EPSS score ?
Summary
(1) ApiBlock.php, (2) ApiCreateAccount.php, (3) ApiLogin.php, (4) ApiMain.php, (5) ApiQueryDeletedrevs.php, (6) ApiTokens.php, and (7) ApiUnblock.php in includes/api/ in MediaWiki 1.19.x before 1.19.8, 1.20.x before 1.20.7, and 1.21.x before 1.21.2 allow remote attackers to obtain CSRF tokens and bypass the cross-site request forgery (CSRF) protection mechanism via a JSONP request to wiki/api.php.
References
▼ | URL | Tags |
---|---|---|
http://seclists.org/oss-sec/2013/q3/553 | mailing-list, x_refsource_MLIST | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/86896 | vdb-entry, x_refsource_XF | |
http://www.debian.org/security/2013/dsa-2753 | vendor-advisory, x_refsource_DEBIAN | |
http://secunia.com/advisories/54715 | third-party-advisory, x_refsource_SECUNIA | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-September/000133.html | mailing-list, x_refsource_MLIST | |
http://osvdb.org/96912 | vdb-entry, x_refsource_OSVDB | |
https://www.mediawiki.org/wiki/Release_notes/1.19 | x_refsource_CONFIRM | |
https://www.mediawiki.org/wiki/Release_notes/1.20 | x_refsource_CONFIRM | |
https://bugzilla.wikimedia.org/show_bug.cgi?id=49090 | x_refsource_CONFIRM | |
https://www.mediawiki.org/wiki/Release_notes/1.21 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:38:01.947Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20130904 Re: CVE request: MediaWiki Security Release: 1.21.2, 1.20.7 and 1.19.8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2013/q3/553" }, { "name": "mediawiki-cve20134302-info-disclosure(86896)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86896" }, { "name": "DSA-2753", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2013/dsa-2753" }, { "name": "54715", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54715" }, { "name": "[MediaWiki-announce] 20130903 MediaWiki Security Release: 1.21.2, 1.20.7 and 1.19.8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-September/000133.html" }, { "name": "96912", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/96912" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mediawiki.org/wiki/Release_notes/1.19" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mediawiki.org/wiki/Release_notes/1.20" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=49090" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mediawiki.org/wiki/Release_notes/1.21" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-09-03T00:00:00", "descriptions": [ { "lang": "en", "value": "(1) ApiBlock.php, (2) ApiCreateAccount.php, (3) ApiLogin.php, (4) ApiMain.php, (5) ApiQueryDeletedrevs.php, (6) ApiTokens.php, and (7) ApiUnblock.php in includes/api/ in MediaWiki 1.19.x before 1.19.8, 1.20.x before 1.20.7, and 1.21.x before 1.21.2 allow remote attackers to obtain CSRF tokens and bypass the cross-site request forgery (CSRF) protection mechanism via a JSONP request to wiki/api.php." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[oss-security] 20130904 Re: CVE request: MediaWiki Security Release: 1.21.2, 1.20.7 and 1.19.8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2013/q3/553" }, { "name": "mediawiki-cve20134302-info-disclosure(86896)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86896" }, { "name": "DSA-2753", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2013/dsa-2753" }, { "name": "54715", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54715" }, { "name": "[MediaWiki-announce] 20130903 MediaWiki Security Release: 1.21.2, 1.20.7 and 1.19.8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-September/000133.html" }, { "name": "96912", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/96912" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mediawiki.org/wiki/Release_notes/1.19" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mediawiki.org/wiki/Release_notes/1.20" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=49090" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mediawiki.org/wiki/Release_notes/1.21" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4302", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "(1) ApiBlock.php, (2) ApiCreateAccount.php, (3) ApiLogin.php, (4) ApiMain.php, (5) ApiQueryDeletedrevs.php, (6) ApiTokens.php, and (7) ApiUnblock.php in includes/api/ in MediaWiki 1.19.x before 1.19.8, 1.20.x before 1.20.7, and 1.21.x before 1.21.2 allow remote attackers to obtain CSRF tokens and bypass the cross-site request forgery (CSRF) protection mechanism via a JSONP request to wiki/api.php." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20130904 Re: CVE request: MediaWiki Security Release: 1.21.2, 1.20.7 and 1.19.8", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2013/q3/553" }, { "name": "mediawiki-cve20134302-info-disclosure(86896)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86896" }, { "name": "DSA-2753", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2013/dsa-2753" }, { "name": "54715", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54715" }, { "name": "[MediaWiki-announce] 20130903 MediaWiki Security Release: 1.21.2, 1.20.7 and 1.19.8", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-September/000133.html" }, { "name": "96912", "refsource": "OSVDB", "url": "http://osvdb.org/96912" }, { "name": "https://www.mediawiki.org/wiki/Release_notes/1.19", "refsource": "CONFIRM", "url": "https://www.mediawiki.org/wiki/Release_notes/1.19" }, { "name": "https://www.mediawiki.org/wiki/Release_notes/1.20", "refsource": "CONFIRM", "url": "https://www.mediawiki.org/wiki/Release_notes/1.20" }, { "name": "https://bugzilla.wikimedia.org/show_bug.cgi?id=49090", "refsource": "CONFIRM", "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=49090" }, { "name": "https://www.mediawiki.org/wiki/Release_notes/1.21", "refsource": "CONFIRM", "url": "https://www.mediawiki.org/wiki/Release_notes/1.21" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-4302", "datePublished": "2013-10-27T00:00:00", "dateReserved": "2013-06-12T00:00:00", "dateUpdated": "2024-08-06T16:38:01.947Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2005-0536
Vulnerability from cvelistv5
Published
2005-02-24 05:00
Modified
2024-08-07 21:13
Severity ?
EPSS score ?
Summary
Directory traversal vulnerability in MediaWiki 1.3.x before 1.3.11 and 1.4 beta before 1.4 rc1 allows remote attackers to delete arbitrary files or determine file existence via a parameter related to image deletion.
References
▼ | URL | Tags |
---|---|---|
http://securitytracker.com/id?1013260 | vdb-entry, x_refsource_SECTRACK | |
http://www.gentoo.org/security/en/glsa/glsa-200502-33.xml | vendor-advisory, x_refsource_GENTOO | |
http://sourceforge.net/project/shownotes.php?release_id=307067 | x_refsource_CONFIRM | |
http://secunia.com/advisories/14360 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T21:13:54.172Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1013260", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1013260" }, { "name": "GLSA-200502-33", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200502-33.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sourceforge.net/project/shownotes.php?release_id=307067" }, { "name": "14360", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/14360" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-02-22T00:00:00", "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in MediaWiki 1.3.x before 1.3.11 and 1.4 beta before 1.4 rc1 allows remote attackers to delete arbitrary files or determine file existence via a parameter related to image deletion." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-03-30T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1013260", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1013260" }, { "name": "GLSA-200502-33", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200502-33.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sourceforge.net/project/shownotes.php?release_id=307067" }, { "name": "14360", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/14360" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-0536", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Directory traversal vulnerability in MediaWiki 1.3.x before 1.3.11 and 1.4 beta before 1.4 rc1 allows remote attackers to delete arbitrary files or determine file existence via a parameter related to image deletion." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1013260", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1013260" }, { "name": "GLSA-200502-33", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200502-33.xml" }, { "name": "http://sourceforge.net/project/shownotes.php?release_id=307067", "refsource": "CONFIRM", "url": "http://sourceforge.net/project/shownotes.php?release_id=307067" }, { "name": "14360", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/14360" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-0536", "datePublished": "2005-02-24T05:00:00", "dateReserved": "2005-02-24T00:00:00", "dateUpdated": "2024-08-07T21:13:54.172Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-25814
Vulnerability from cvelistv5
Published
2020-09-27 20:29
Modified
2024-08-04 15:40
Severity ?
EPSS score ?
Summary
In MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4, XSS related to jQuery can occur. The attacker creates a message with [javascript:payload xss] and turns it into a jQuery object with mw.message().parse(). The expected result is that the jQuery object does not contain an <a> tag (or it does not have a href attribute, or it's empty, etc.). The actual result is that the object contains an <a href ="javascript... that executes when clicked.
References
▼ | URL | Tags |
---|---|---|
https://www.mediawiki.org/wiki/ResourceLoader/Core_modules#mediawiki.jqueryMsg | x_refsource_MISC | |
https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html | x_refsource_CONFIRM | |
https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html | x_refsource_MISC | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RTTPZ7XMDS66I442OLLHXBDNP2LCBJU6/ | vendor-advisory, x_refsource_FEDORA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:40:36.987Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.mediawiki.org/wiki/ResourceLoader/Core_modules#mediawiki.jqueryMsg" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html" }, { "name": "FEDORA-2020-a4802c53d9", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RTTPZ7XMDS66I442OLLHXBDNP2LCBJU6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4, XSS related to jQuery can occur. The attacker creates a message with [javascript:payload xss] and turns it into a jQuery object with mw.message().parse(). The expected result is that the jQuery object does not contain an \u003ca\u003e tag (or it does not have a href attribute, or it\u0027s empty, etc.). The actual result is that the object contains an \u003ca href =\"javascript... that executes when clicked." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-14T02:06:08", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.mediawiki.org/wiki/ResourceLoader/Core_modules#mediawiki.jqueryMsg" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html" }, { "name": "FEDORA-2020-a4802c53d9", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RTTPZ7XMDS66I442OLLHXBDNP2LCBJU6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-25814", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4, XSS related to jQuery can occur. The attacker creates a message with [javascript:payload xss] and turns it into a jQuery object with mw.message().parse(). The expected result is that the jQuery object does not contain an \u003ca\u003e tag (or it does not have a href attribute, or it\u0027s empty, etc.). The actual result is that the object contains an \u003ca href =\"javascript... that executes when clicked." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.mediawiki.org/wiki/ResourceLoader/Core_modules#mediawiki.jqueryMsg", "refsource": "MISC", "url": "https://www.mediawiki.org/wiki/ResourceLoader/Core_modules#mediawiki.jqueryMsg" }, { "name": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html", "refsource": "CONFIRM", "url": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html" }, { "name": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html", "refsource": "MISC", "url": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html" }, { "name": "FEDORA-2020-a4802c53d9", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RTTPZ7XMDS66I442OLLHXBDNP2LCBJU6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-25814", "datePublished": "2020-09-27T20:29:44", "dateReserved": "2020-09-23T00:00:00", "dateUpdated": "2024-08-04T15:40:36.987Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-37255
Vulnerability from cvelistv5
Published
2023-06-29 00:00
Modified
2024-11-26 19:36
Severity ?
EPSS score ?
Summary
An issue was discovered in the CheckUser extension for MediaWiki through 1.39.3. In Special:CheckUser, a check of the "get edits" type is vulnerable to HTML injection through the User-Agent HTTP request header.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:09:33.058Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T333569" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-37255", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-26T19:36:36.377825Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-26T19:36:50.300Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the CheckUser extension for MediaWiki through 1.39.3. In Special:CheckUser, a check of the \"get edits\" type is vulnerable to HTML injection through the User-Agent HTTP request header." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-29T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T333569" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-37255", "datePublished": "2023-06-29T00:00:00", "dateReserved": "2023-06-29T00:00:00", "dateUpdated": "2024-11-26T19:36:50.300Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-29903
Vulnerability from cvelistv5
Published
2022-04-29 03:44
Modified
2024-08-03 06:33
Severity ?
EPSS score ?
Summary
The Private Domains extension for MediaWiki through 1.37.2 (before 1ad65d4c1c199b375ea80988d99ab51ae068f766) allows CSRF for editing pages that store the extension's configuration. The attacker must trigger a POST request to Special:PrivateDomains.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T306290 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/c/mediawiki/extensions/PrivateDomains/+/783416 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:33:43.184Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T306290" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/PrivateDomains/+/783416" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The Private Domains extension for MediaWiki through 1.37.2 (before 1ad65d4c1c199b375ea80988d99ab51ae068f766) allows CSRF for editing pages that store the extension\u0027s configuration. The attacker must trigger a POST request to Special:PrivateDomains." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-29T03:44:15", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T306290" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/PrivateDomains/+/783416" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-29903", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Private Domains extension for MediaWiki through 1.37.2 (before 1ad65d4c1c199b375ea80988d99ab51ae068f766) allows CSRF for editing pages that store the extension\u0027s configuration. The attacker must trigger a POST request to Special:PrivateDomains." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T306290", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T306290" }, { "name": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/PrivateDomains/+/783416", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/PrivateDomains/+/783416" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-29903", "datePublished": "2022-04-29T03:44:15", "dateReserved": "2022-04-29T00:00:00", "dateUpdated": "2024-08-03T06:33:43.184Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-29906
Vulnerability from cvelistv5
Published
2022-04-29 03:42
Modified
2024-08-03 06:33
Severity ?
EPSS score ?
Summary
The admin API module in the QuizGame extension for MediaWiki through 1.37.2 (before 665e33a68f6fa1167df99c0aa18ed0157cdf9f66) omits a check for the quizadmin user.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T302199 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/c/mediawiki/extensions/QuizGame/+/765651 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:33:43.164Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T302199" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/QuizGame/+/765651" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The admin API module in the QuizGame extension for MediaWiki through 1.37.2 (before 665e33a68f6fa1167df99c0aa18ed0157cdf9f66) omits a check for the quizadmin user." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-29T03:42:52", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T302199" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/QuizGame/+/765651" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-29906", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The admin API module in the QuizGame extension for MediaWiki through 1.37.2 (before 665e33a68f6fa1167df99c0aa18ed0157cdf9f66) omits a check for the quizadmin user." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T302199", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T302199" }, { "name": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/QuizGame/+/765651", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/QuizGame/+/765651" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-29906", "datePublished": "2022-04-29T03:42:52", "dateReserved": "2022-04-29T00:00:00", "dateUpdated": "2024-08-03T06:33:43.164Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-3455
Vulnerability from cvelistv5
Published
2014-05-12 14:00
Modified
2024-09-17 02:42
Severity ?
EPSS score ?
Summary
Multiple cross-site request forgery (CSRF) vulnerabilities in the (1) CreateProperty, (2) CreateTemplate, (3) CreateForm, and (4) CreateClass special pages in the SemanticForms extension for MediaWiki before 1.19.10, 1.2x before 1.21.4, and 1.22.x before 1.22.1 allow remote attackers to hijack the authentication of users for requests that have unspecified impact and vectors.
References
▼ | URL | Tags |
---|---|---|
http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000138.html | mailing-list, x_refsource_MLIST | |
https://bugzilla.wikimedia.org/show_bug.cgi?id=57025 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:43:06.148Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[MediaWiki-announce] 20140114 MediaWiki Security Releases: 1.22.1, 1.21.4 and 1.19.10", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000138.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=57025" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in the (1) CreateProperty, (2) CreateTemplate, (3) CreateForm, and (4) CreateClass special pages in the SemanticForms extension for MediaWiki before 1.19.10, 1.2x before 1.21.4, and 1.22.x before 1.22.1 allow remote attackers to hijack the authentication of users for requests that have unspecified impact and vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-05-12T14:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[MediaWiki-announce] 20140114 MediaWiki Security Releases: 1.22.1, 1.21.4 and 1.19.10", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000138.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=57025" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-3455", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in the (1) CreateProperty, (2) CreateTemplate, (3) CreateForm, and (4) CreateClass special pages in the SemanticForms extension for MediaWiki before 1.19.10, 1.2x before 1.21.4, and 1.22.x before 1.22.1 allow remote attackers to hijack the authentication of users for requests that have unspecified impact and vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[MediaWiki-announce] 20140114 MediaWiki Security Releases: 1.22.1, 1.21.4 and 1.19.10", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000138.html" }, { "name": "https://bugzilla.wikimedia.org/show_bug.cgi?id=57025", "refsource": "CONFIRM", "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=57025" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-3455", "datePublished": "2014-05-12T14:00:00Z", "dateReserved": "2014-05-12T00:00:00Z", "dateUpdated": "2024-09-17T02:42:25.979Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-26121
Vulnerability from cvelistv5
Published
2020-09-27 20:08
Modified
2024-08-04 15:49
Severity ?
EPSS score ?
Summary
An issue was discovered in the FileImporter extension for MediaWiki before 1.34.4. An attacker can import a file even when the target page is protected against "page creation" and the attacker should not be able to create it. This occurs because of a mishandled distinction between an upload restriction and a create restriction. An attacker cannot leverage this to overwrite anything, but can leverage this to force a wiki to have a page with a disallowed title.
References
▼ | URL | Tags |
---|---|---|
https://commons.wikimedia.org/w/index.php?oldid=454609892#File:Wiki.png | x_refsource_MISC | |
https://phabricator.wikimedia.org/T262628 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/Ib852a96afc4dca10516d0510e69c10f9892b351b | x_refsource_MISC | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RTTPZ7XMDS66I442OLLHXBDNP2LCBJU6/ | vendor-advisory, x_refsource_FEDORA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:49:07.127Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://commons.wikimedia.org/w/index.php?oldid=454609892#File:Wiki.png" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T262628" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/Ib852a96afc4dca10516d0510e69c10f9892b351b" }, { "name": "FEDORA-2020-a4802c53d9", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RTTPZ7XMDS66I442OLLHXBDNP2LCBJU6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the FileImporter extension for MediaWiki before 1.34.4. An attacker can import a file even when the target page is protected against \"page creation\" and the attacker should not be able to create it. This occurs because of a mishandled distinction between an upload restriction and a create restriction. An attacker cannot leverage this to overwrite anything, but can leverage this to force a wiki to have a page with a disallowed title." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-14T02:06:09", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://commons.wikimedia.org/w/index.php?oldid=454609892#File:Wiki.png" }, { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T262628" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/Ib852a96afc4dca10516d0510e69c10f9892b351b" }, { "name": "FEDORA-2020-a4802c53d9", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RTTPZ7XMDS66I442OLLHXBDNP2LCBJU6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-26121", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in the FileImporter extension for MediaWiki before 1.34.4. An attacker can import a file even when the target page is protected against \"page creation\" and the attacker should not be able to create it. This occurs because of a mishandled distinction between an upload restriction and a create restriction. An attacker cannot leverage this to overwrite anything, but can leverage this to force a wiki to have a page with a disallowed title." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://commons.wikimedia.org/w/index.php?oldid=454609892#File:Wiki.png", "refsource": "MISC", "url": "https://commons.wikimedia.org/w/index.php?oldid=454609892#File:Wiki.png" }, { "name": "https://phabricator.wikimedia.org/T262628", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T262628" }, { "name": "https://gerrit.wikimedia.org/r/q/Ib852a96afc4dca10516d0510e69c10f9892b351b", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/Ib852a96afc4dca10516d0510e69c10f9892b351b" }, { "name": "FEDORA-2020-a4802c53d9", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RTTPZ7XMDS66I442OLLHXBDNP2LCBJU6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-26121", "datePublished": "2020-09-27T20:08:00", "dateReserved": "2020-09-27T00:00:00", "dateUpdated": "2024-08-04T15:49:07.127Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-23174
Vulnerability from cvelistv5
Published
2024-01-12 00:00
Modified
2024-08-01 22:59
Severity ?
EPSS score ?
Summary
An issue was discovered in the PageTriage extension in MediaWiki before 1.35.14, 1.36.x through 1.39.x before 1.39.6, and 1.40.x before 1.40.2. XSS can occur via the rev-deleted-user, pagetriage-tags-quickfilter-label, pagetriage-triage, pagetriage-filter-date-range-format-placeholder, pagetriage-filter-date-range-to, pagetriage-filter-date-range-from, pagetriage-filter-date-range-heading, pagetriage-filter-set-button, or pagetriage-filter-reset-button message.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T22:59:31.665Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T347704" }, { "tags": [ "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/PageTriage/+/989177" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the PageTriage extension in MediaWiki before 1.35.14, 1.36.x through 1.39.x before 1.39.6, and 1.40.x before 1.40.2. XSS can occur via the rev-deleted-user, pagetriage-tags-quickfilter-label, pagetriage-triage, pagetriage-filter-date-range-format-placeholder, pagetriage-filter-date-range-to, pagetriage-filter-date-range-from, pagetriage-filter-date-range-heading, pagetriage-filter-set-button, or pagetriage-filter-reset-button message." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-12T04:39:39.153603", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T347704" }, { "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/PageTriage/+/989177" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-23174", "datePublished": "2024-01-12T00:00:00", "dateReserved": "2024-01-12T00:00:00", "dateUpdated": "2024-08-01T22:59:31.665Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2005-3167
Vulnerability from cvelistv5
Published
2005-10-06 04:00
Modified
2024-08-07 23:01
Severity ?
EPSS score ?
Summary
Incomplete blacklist vulnerability in MediaWiki before 1.4.11 does not properly remove certain CSS inputs (HTML inline style attributes) that are processed as active content by Internet Explorer, which allows remote attackers to conduct cross-site scripting (XSS) attacks.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/15024 | vdb-entry, x_refsource_BID | |
http://sourceforge.net/project/shownotes.php?release_id=361505 | x_refsource_CONFIRM | |
http://secunia.com/advisories/17074 | third-party-advisory, x_refsource_SECUNIA | |
http://www.novell.com/linux/security/advisories/2005_27_sr.html | vendor-advisory, x_refsource_SUSE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T23:01:58.969Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "15024", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/15024" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sourceforge.net/project/shownotes.php?release_id=361505" }, { "name": "17074", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17074" }, { "name": "SUSE-SR:2005:027", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2005_27_sr.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-10-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Incomplete blacklist vulnerability in MediaWiki before 1.4.11 does not properly remove certain CSS inputs (HTML inline style attributes) that are processed as active content by Internet Explorer, which allows remote attackers to conduct cross-site scripting (XSS) attacks." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-12-12T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "15024", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/15024" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sourceforge.net/project/shownotes.php?release_id=361505" }, { "name": "17074", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17074" }, { "name": "SUSE-SR:2005:027", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2005_27_sr.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-3167", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Incomplete blacklist vulnerability in MediaWiki before 1.4.11 does not properly remove certain CSS inputs (HTML inline style attributes) that are processed as active content by Internet Explorer, which allows remote attackers to conduct cross-site scripting (XSS) attacks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "15024", "refsource": "BID", "url": "http://www.securityfocus.com/bid/15024" }, { "name": "http://sourceforge.net/project/shownotes.php?release_id=361505", "refsource": "CONFIRM", "url": "http://sourceforge.net/project/shownotes.php?release_id=361505" }, { "name": "17074", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17074" }, { "name": "SUSE-SR:2005:027", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2005_27_sr.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-3167", "datePublished": "2005-10-06T04:00:00", "dateReserved": "2005-10-06T00:00:00", "dateUpdated": "2024-08-07T23:01:58.969Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-35480
Vulnerability from cvelistv5
Published
2020-12-18 07:40
Modified
2024-08-04 17:02
Severity ?
EPSS score ?
Summary
An issue was discovered in MediaWiki before 1.35.1. Missing users (accounts that don't exist) and hidden users (accounts that have been explicitly hidden due to being abusive, or similar) that the viewer cannot see are handled differently, exposing sensitive information about the hidden status to unprivileged viewers. This exists on various code paths.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T120883 | x_refsource_MISC | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2020-December/000268.html | x_refsource_MISC | |
https://www.debian.org/security/2020/dsa-4816 | vendor-advisory, x_refsource_DEBIAN | |
https://lists.debian.org/debian-lts-announce/2020/12/msg00034.html | mailing-list, x_refsource_MLIST | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STT5Z4A3BCXVH3WIPICWU2FP4IPIMUPC/ | vendor-advisory, x_refsource_FEDORA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:02:08.193Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T120883" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2020-December/000268.html" }, { "name": "DSA-4816", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2020/dsa-4816" }, { "name": "[debian-lts-announce] 20201223 [SECURITY] [DLA 2504-1] mediawiki security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00034.html" }, { "name": "FEDORA-2020-0be2d40e13", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STT5Z4A3BCXVH3WIPICWU2FP4IPIMUPC/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MediaWiki before 1.35.1. Missing users (accounts that don\u0027t exist) and hidden users (accounts that have been explicitly hidden due to being abusive, or similar) that the viewer cannot see are handled differently, exposing sensitive information about the hidden status to unprivileged viewers. This exists on various code paths." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-27T03:06:16", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T120883" }, { "tags": [ "x_refsource_MISC" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2020-December/000268.html" }, { "name": "DSA-4816", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2020/dsa-4816" }, { "name": "[debian-lts-announce] 20201223 [SECURITY] [DLA 2504-1] mediawiki security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00034.html" }, { "name": "FEDORA-2020-0be2d40e13", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STT5Z4A3BCXVH3WIPICWU2FP4IPIMUPC/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-35480", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in MediaWiki before 1.35.1. Missing users (accounts that don\u0027t exist) and hidden users (accounts that have been explicitly hidden due to being abusive, or similar) that the viewer cannot see are handled differently, exposing sensitive information about the hidden status to unprivileged viewers. This exists on various code paths." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T120883", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T120883" }, { "name": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2020-December/000268.html", "refsource": "MISC", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2020-December/000268.html" }, { "name": "DSA-4816", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4816" }, { "name": "[debian-lts-announce] 20201223 [SECURITY] [DLA 2504-1] mediawiki security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00034.html" }, { "name": "FEDORA-2020-0be2d40e13", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STT5Z4A3BCXVH3WIPICWU2FP4IPIMUPC/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-35480", "datePublished": "2020-12-18T07:40:38", "dateReserved": "2020-12-16T00:00:00", "dateUpdated": "2024-08-04T17:02:08.193Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-6734
Vulnerability from cvelistv5
Published
2015-09-01 14:00
Modified
2024-08-06 07:29
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in contrib/cssgen.php in the GeSHi, as used in the SyntaxHighlight_GeSHi extension and MediaWiki before 1.23.10, 1.24.x before 1.24.3, and 1.25.x before 1.25.2, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
https://security.gentoo.org/glsa/201510-05 | vendor-advisory, x_refsource_GENTOO | |
http://www.openwall.com/lists/oss-security/2015/08/27/6 | mailing-list, x_refsource_MLIST | |
https://phabricator.wikimedia.org/T108198 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2015/08/12/6 | mailing-list, x_refsource_MLIST | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-August/000179.html | mailing-list, x_refsource_MLIST | |
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165193.html | vendor-advisory, x_refsource_FEDORA | |
http://www.securityfocus.com/bid/76361 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:29:24.463Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201510-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201510-05" }, { "name": "[oss-security] 20150827 Re: CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/08/27/6" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T108198" }, { "name": "[oss-security] 20150812 CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/08/12/6" }, { "name": "[MediaWiki-announce] 20150810 MediaWiki Security and Maintenance Releases: 1.25.2, 1.24.3, 1.23.10", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-August/000179.html" }, { "name": "FEDORA-2015-13920", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165193.html" }, { "name": "76361", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/76361" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-08-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in contrib/cssgen.php in the GeSHi, as used in the SyntaxHighlight_GeSHi extension and MediaWiki before 1.23.10, 1.24.x before 1.24.3, and 1.25.x before 1.25.2, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-05T21:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "GLSA-201510-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201510-05" }, { "name": "[oss-security] 20150827 Re: CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/08/27/6" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T108198" }, { "name": "[oss-security] 20150812 CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/08/12/6" }, { "name": "[MediaWiki-announce] 20150810 MediaWiki Security and Maintenance Releases: 1.25.2, 1.24.3, 1.23.10", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-August/000179.html" }, { "name": "FEDORA-2015-13920", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165193.html" }, { "name": "76361", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/76361" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-6734", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in contrib/cssgen.php in the GeSHi, as used in the SyntaxHighlight_GeSHi extension and MediaWiki before 1.23.10, 1.24.x before 1.24.3, and 1.25.x before 1.25.2, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201510-05", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201510-05" }, { "name": "[oss-security] 20150827 Re: CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/08/27/6" }, { "name": "https://phabricator.wikimedia.org/T108198", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T108198" }, { "name": "[oss-security] 20150812 CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/08/12/6" }, { "name": "[MediaWiki-announce] 20150810 MediaWiki Security and Maintenance Releases: 1.25.2, 1.24.3, 1.23.10", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-August/000179.html" }, { "name": "FEDORA-2015-13920", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165193.html" }, { "name": "76361", "refsource": "BID", "url": "http://www.securityfocus.com/bid/76361" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-6734", "datePublished": "2015-09-01T14:00:00", "dateReserved": "2015-08-27T00:00:00", "dateUpdated": "2024-08-06T07:29:24.463Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-29005
Vulnerability from cvelistv5
Published
2021-01-29 06:19
Modified
2024-08-04 16:48
Severity ?
EPSS score ?
Summary
The API in the Push extension for MediaWiki through 1.35 used cleartext for ApiPush credentials, allowing for potential information disclosure.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T262724 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Push/+/625988 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:48:01.247Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T262724" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Push/+/625988" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The API in the Push extension for MediaWiki through 1.35 used cleartext for ApiPush credentials, allowing for potential information disclosure." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-29T06:19:43", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T262724" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Push/+/625988" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-29005", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The API in the Push extension for MediaWiki through 1.35 used cleartext for ApiPush credentials, allowing for potential information disclosure." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T262724", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T262724" }, { "name": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Push/+/625988", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Push/+/625988" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-29005", "datePublished": "2021-01-29T06:19:43", "dateReserved": "2020-11-24T00:00:00", "dateUpdated": "2024-08-04T16:48:01.247Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39194
Vulnerability from cvelistv5
Published
2022-09-02 04:45
Modified
2024-08-03 12:00
Severity ?
EPSS score ?
Summary
An issue was discovered in the MediaWiki through 1.38.2. The community configuration pages for the GrowthExperiments extension could cause a site to become unavailable due to insufficient validation when certain actions (including page moves) were performed.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T313205 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:00:43.589Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T313205" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the MediaWiki through 1.38.2. The community configuration pages for the GrowthExperiments extension could cause a site to become unavailable due to insufficient validation when certain actions (including page moves) were performed." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-02T04:45:37", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T313205" } ], "source": { "discovery": "INTERNAL" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-39194", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in the MediaWiki through 1.38.2. The community configuration pages for the GrowthExperiments extension could cause a site to become unavailable due to insufficient validation when certain actions (including page moves) were performed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T313205", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T313205" } ] }, "source": { "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-39194", "datePublished": "2022-09-02T04:45:37", "dateReserved": "2022-09-02T00:00:00", "dateUpdated": "2024-08-03T12:00:43.589Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-29907
Vulnerability from cvelistv5
Published
2022-04-29 03:42
Modified
2024-08-03 06:33
Severity ?
EPSS score ?
Summary
The Nimbus skin for MediaWiki through 1.37.2 (before 6f9c8fb868345701d9544a54d9752515aace39df) allows XSS in Advertise link messages.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T306815 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/c/786959 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:33:43.175Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T306815" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/c/786959" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The Nimbus skin for MediaWiki through 1.37.2 (before 6f9c8fb868345701d9544a54d9752515aace39df) allows XSS in Advertise link messages." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-29T03:42:25", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T306815" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/c/786959" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-29907", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Nimbus skin for MediaWiki through 1.37.2 (before 6f9c8fb868345701d9544a54d9752515aace39df) allows XSS in Advertise link messages." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T306815", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T306815" }, { "name": "https://gerrit.wikimedia.org/r/c/786959", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/c/786959" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-29907", "datePublished": "2022-04-29T03:42:28", "dateReserved": "2022-04-29T00:00:00", "dateUpdated": "2024-08-03T06:33:43.175Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28323
Vulnerability from cvelistv5
Published
2022-04-30 15:05
Modified
2024-08-03 05:48
Severity ?
EPSS score ?
Summary
An issue was discovered in MediaWiki through 1.37.2. The SecurePoll extension allows a leak because sorting by timestamp is supported,
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T298434 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/I9d3b9a942ea71d777ec32121fa36262f549d283d | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/93758c4c13b972d240a6313e0472df1667118893 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:48:37.903Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T298434" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/I9d3b9a942ea71d777ec32121fa36262f549d283d" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/93758c4c13b972d240a6313e0472df1667118893" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MediaWiki through 1.37.2. The SecurePoll extension allows a leak because sorting by timestamp is supported," } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-30T15:05:46", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T298434" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/I9d3b9a942ea71d777ec32121fa36262f549d283d" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/93758c4c13b972d240a6313e0472df1667118893" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-28323", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in MediaWiki through 1.37.2. The SecurePoll extension allows a leak because sorting by timestamp is supported," } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T298434", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T298434" }, { "name": "https://gerrit.wikimedia.org/r/q/I9d3b9a942ea71d777ec32121fa36262f549d283d", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/I9d3b9a942ea71d777ec32121fa36262f549d283d" }, { "name": "https://gerrit.wikimedia.org/r/q/93758c4c13b972d240a6313e0472df1667118893", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/93758c4c13b972d240a6313e0472df1667118893" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-28323", "datePublished": "2022-04-30T15:05:46", "dateReserved": "2022-04-01T00:00:00", "dateUpdated": "2024-08-03T05:48:37.903Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22909
Vulnerability from cvelistv5
Published
2023-01-10 00:00
Modified
2024-08-02 10:20
Severity ?
EPSS score ?
Summary
An issue was discovered in MediaWiki before 1.35.9, 1.36.x through 1.38.x before 1.38.5, and 1.39.x before 1.39.1. SpecialMobileHistory allows remote attackers to cause a denial of service because database queries are slow.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:20:31.389Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T320987" }, { "name": "FEDORA-2023-30a7a812f0", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AP65YEN762IBNQPOYGUVLTQIDLM5XD2A/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MediaWiki before 1.35.9, 1.36.x through 1.38.x before 1.38.5, and 1.39.x before 1.39.1. SpecialMobileHistory allows remote attackers to cause a denial of service because database queries are slow." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-27T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T320987" }, { "name": "FEDORA-2023-30a7a812f0", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AP65YEN762IBNQPOYGUVLTQIDLM5XD2A/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-22909", "datePublished": "2023-01-10T00:00:00", "dateReserved": "2023-01-10T00:00:00", "dateUpdated": "2024-08-02T10:20:31.389Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-0363
Vulnerability from cvelistv5
Published
2018-04-13 16:00
Modified
2024-09-16 19:21
Severity ?
EPSS score ?
Summary
Mediawiki before 1.28.1 / 1.27.2 / 1.23.16 has a flaw where Special:UserLogin?returnto=interwiki:foo will redirect to external sites.
References
▼ | URL | Tags |
---|---|---|
https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html | mailing-list, x_refsource_MLIST | |
https://phabricator.wikimedia.org/T109140 | x_refsource_CONFIRM | |
https://security-tracker.debian.org/tracker/CVE-2017-0363 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T13:03:56.660Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[mediawiki-announce] 20170406 Security Release: 1.28.1 / 1.27.2 / 1.23.16", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T109140" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security-tracker.debian.org/tracker/CVE-2017-0363" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "mediawiki", "vendor": "mediawiki", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-04-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Mediawiki before 1.28.1 / 1.27.2 / 1.23.16 has a flaw where Special:UserLogin?returnto=interwiki:foo will redirect to external sites." } ], "problemTypes": [ { "descriptions": [ { "description": "redirection to other external sites", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-04-13T15:57:01", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "name": "[mediawiki-announce] 20170406 Security Release: 1.28.1 / 1.27.2 / 1.23.16", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T109140" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security-tracker.debian.org/tracker/CVE-2017-0363" } ], "source": { "advisory": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html", "discovery": "UNKNOWN" }, "title": "Special:UserLogin?returnto=interwiki:foo will redirect to external sites", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "DATE_PUBLIC": "2017-04-06T20:49:00.000Z", "ID": "CVE-2017-0363", "STATE": "PUBLIC", "TITLE": "Special:UserLogin?returnto=interwiki:foo will redirect to external sites" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "mediawiki", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "mediawiki" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Mediawiki before 1.28.1 / 1.27.2 / 1.23.16 has a flaw where Special:UserLogin?returnto=interwiki:foo will redirect to external sites." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "redirection to other external sites" } ] } ] }, "references": { "reference_data": [ { "name": "[mediawiki-announce] 20170406 Security Release: 1.28.1 / 1.27.2 / 1.23.16", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html" }, { "name": "https://phabricator.wikimedia.org/T109140", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T109140" }, { "name": "https://security-tracker.debian.org/tracker/CVE-2017-0363", "refsource": "CONFIRM", "url": "https://security-tracker.debian.org/tracker/CVE-2017-0363" } ] }, "source": { "advisory": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2017-0363", "datePublished": "2018-04-13T16:00:00Z", "dateReserved": "2016-11-29T00:00:00", "dateUpdated": "2024-09-16T19:21:14.211Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-8811
Vulnerability from cvelistv5
Published
2017-11-15 08:00
Modified
2024-08-05 16:48
Severity ?
EPSS score ?
Summary
The implementation of raw message parameter expansion in MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2 allows HTML mangling attacks.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1039812 | vdb-entry, x_refsource_SECTRACK | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-November/000216.html | x_refsource_CONFIRM | |
https://www.debian.org/security/2017/dsa-4036 | vendor-advisory, x_refsource_DEBIAN |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2 |
Version: MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T16:48:22.605Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1039812", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039812" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-November/000216.html" }, { "name": "DSA-4036", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2017/dsa-4036" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2", "vendor": "n/a", "versions": [ { "status": "affected", "version": "MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2" } ] } ], "datePublic": "2017-11-15T00:00:00", "descriptions": [ { "lang": "en", "value": "The implementation of raw message parameter expansion in MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2 allows HTML mangling attacks." } ], "problemTypes": [ { "descriptions": [ { "description": "HTML mangling", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-16T10:57:01", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "name": "1039812", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039812" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-November/000216.html" }, { "name": "DSA-4036", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2017/dsa-4036" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "ID": "CVE-2017-8811", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2", "version": { "version_data": [ { "version_value": "MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The implementation of raw message parameter expansion in MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2 allows HTML mangling attacks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "HTML mangling" } ] } ] }, "references": { "reference_data": [ { "name": "1039812", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039812" }, { "name": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-November/000216.html", "refsource": "CONFIRM", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-November/000216.html" }, { "name": "DSA-4036", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2017/dsa-4036" } ] } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2017-8811", "datePublished": "2017-11-15T08:00:00", "dateReserved": "2017-05-07T00:00:00", "dateUpdated": "2024-08-05T16:48:22.605Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-31555
Vulnerability from cvelistv5
Published
2021-04-22 02:28
Modified
2024-08-03 23:03
Severity ?
EPSS score ?
Summary
An issue was discovered in the Oauth extension for MediaWiki through 1.35.2. It did not validate the oarc_version (aka oauth_registered_consumer.oarc_version) parameter's length.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T277388 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/I222c053b4b14ac1ad0f5b3a51565b1b9cd4c139d | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:03:33.486Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T277388" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/I222c053b4b14ac1ad0f5b3a51565b1b9cd4c139d" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the Oauth extension for MediaWiki through 1.35.2. It did not validate the oarc_version (aka oauth_registered_consumer.oarc_version) parameter\u0027s length." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-22T02:28:51", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T277388" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/I222c053b4b14ac1ad0f5b3a51565b1b9cd4c139d" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-31555", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in the Oauth extension for MediaWiki through 1.35.2. It did not validate the oarc_version (aka oauth_registered_consumer.oarc_version) parameter\u0027s length." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T277388", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T277388" }, { "name": "https://gerrit.wikimedia.org/r/q/I222c053b4b14ac1ad0f5b3a51565b1b9cd4c139d", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/I222c053b4b14ac1ad0f5b3a51565b1b9cd4c139d" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-31555", "datePublished": "2021-04-22T02:28:51", "dateReserved": "2021-04-22T00:00:00", "dateUpdated": "2024-08-03T23:03:33.486Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-2187
Vulnerability from cvelistv5
Published
2005-07-10 04:00
Modified
2024-09-16 19:56
Severity ?
EPSS score ?
Summary
Unknown vulnerability in ImagePage for MediaWiki 1.3.5, related to "filename validation," has unknown impact and attack vectors.
References
▼ | URL | Tags |
---|---|---|
http://sourceforge.net/project/shownotes.php?release_id=275099 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/11416 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T01:15:01.933Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sourceforge.net/project/shownotes.php?release_id=275099" }, { "name": "11416", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/11416" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Unknown vulnerability in ImagePage for MediaWiki 1.3.5, related to \"filename validation,\" has unknown impact and attack vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-07-10T04:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sourceforge.net/project/shownotes.php?release_id=275099" }, { "name": "11416", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/11416" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-2187", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unknown vulnerability in ImagePage for MediaWiki 1.3.5, related to \"filename validation,\" has unknown impact and attack vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://sourceforge.net/project/shownotes.php?release_id=275099", "refsource": "CONFIRM", "url": "http://sourceforge.net/project/shownotes.php?release_id=275099" }, { "name": "11416", "refsource": "BID", "url": "http://www.securityfocus.com/bid/11416" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-2187", "datePublished": "2005-07-10T04:00:00Z", "dateReserved": "2005-07-10T04:00:00Z", "dateUpdated": "2024-09-16T19:56:51.306Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46146
Vulnerability from cvelistv5
Published
2022-01-07 05:53
Modified
2024-08-04 05:02
Severity ?
EPSS score ?
Summary
An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. The WikibaseMediaInfo component is vulnerable to XSS via the caption fields for a given media file.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T293556 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/I58d37fb59f998f5bec4a018bf9da96a777f8ff78 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:02:10.272Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T293556" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/I58d37fb59f998f5bec4a018bf9da96a777f8ff78" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. The WikibaseMediaInfo component is vulnerable to XSS via the caption fields for a given media file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T05:53:16", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T293556" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/I58d37fb59f998f5bec4a018bf9da96a777f8ff78" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-46146", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. The WikibaseMediaInfo component is vulnerable to XSS via the caption fields for a given media file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T293556", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T293556" }, { "name": "https://gerrit.wikimedia.org/r/q/I58d37fb59f998f5bec4a018bf9da96a777f8ff78", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/I58d37fb59f998f5bec4a018bf9da96a777f8ff78" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-46146", "datePublished": "2022-01-07T05:53:16", "dateReserved": "2022-01-07T00:00:00", "dateUpdated": "2024-08-04T05:02:10.272Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-12051
Vulnerability from cvelistv5
Published
2020-04-21 21:24
Modified
2024-08-04 11:48
Severity ?
EPSS score ?
Summary
The CentralAuth extension through REL1_34 for MediaWiki allows remote attackers to obtain sensitive hidden account information via an api.php?action=query&meta=globaluserinfo&guiuser= request. In other words, the information can be retrieved via the action API even though access would be denied when simply visiting wiki/Special:CentralAuth in a web browser.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T250594 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/#/q/I3c80641dc1202df7428714f0ca44717a51ff6021 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:48:58.044Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T250594" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/#/q/I3c80641dc1202df7428714f0ca44717a51ff6021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The CentralAuth extension through REL1_34 for MediaWiki allows remote attackers to obtain sensitive hidden account information via an api.php?action=query\u0026meta=globaluserinfo\u0026guiuser= request. In other words, the information can be retrieved via the action API even though access would be denied when simply visiting wiki/Special:CentralAuth in a web browser." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-21T21:24:33", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T250594" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/#/q/I3c80641dc1202df7428714f0ca44717a51ff6021" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-12051", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The CentralAuth extension through REL1_34 for MediaWiki allows remote attackers to obtain sensitive hidden account information via an api.php?action=query\u0026meta=globaluserinfo\u0026guiuser= request. In other words, the information can be retrieved via the action API even though access would be denied when simply visiting wiki/Special:CentralAuth in a web browser." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T250594", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T250594" }, { "name": "https://gerrit.wikimedia.org/r/#/q/I3c80641dc1202df7428714f0ca44717a51ff6021", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/#/q/I3c80641dc1202df7428714f0ca44717a51ff6021" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-12051", "datePublished": "2020-04-21T21:24:33", "dateReserved": "2020-04-21T00:00:00", "dateUpdated": "2024-08-04T11:48:58.044Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-35622
Vulnerability from cvelistv5
Published
2020-12-21 22:37
Modified
2024-08-04 17:09
Severity ?
EPSS score ?
Summary
An issue was discovered in the GlobalUsage extension for MediaWiki through 1.35.1. SpecialGlobalUsage.php calls WikiMap::makeForeignLink unsafely. The $page variable within the formatItem function was not being properly escaped, allowing for XSS under certain conditions.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T268341 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/c/mediawiki/extensions/GlobalUsage/+/646744 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:09:14.841Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T268341" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/GlobalUsage/+/646744" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the GlobalUsage extension for MediaWiki through 1.35.1. SpecialGlobalUsage.php calls WikiMap::makeForeignLink unsafely. The $page variable within the formatItem function was not being properly escaped, allowing for XSS under certain conditions." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-21T22:37:29", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T268341" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/GlobalUsage/+/646744" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-35622", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in the GlobalUsage extension for MediaWiki through 1.35.1. SpecialGlobalUsage.php calls WikiMap::makeForeignLink unsafely. The $page variable within the formatItem function was not being properly escaped, allowing for XSS under certain conditions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T268341", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T268341" }, { "name": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/GlobalUsage/+/646744", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/GlobalUsage/+/646744" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-35622", "datePublished": "2020-12-21T22:37:29", "dateReserved": "2020-12-21T00:00:00", "dateUpdated": "2024-08-04T17:09:14.841Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-13258
Vulnerability from cvelistv5
Published
2018-10-04 20:00
Modified
2024-09-16 23:21
Severity ?
EPSS score ?
Summary
Mediawiki 1.31 before 1.31.1 misses .htaccess files in the provided tarball used to protect some directories that shouldn't be web accessible.
References
▼ | URL | Tags |
---|---|---|
https://lists.wikimedia.org/pipermail/wikitech-l/2018-September/090849.html | mailing-list, x_refsource_MLIST | |
http://www.securitytracker.com/id/1041695 | vdb-entry, x_refsource_SECTRACK | |
https://phabricator.wikimedia.org/T199029 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T09:00:34.528Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[wikitech-l] 20180920 Security release: 1.27.5 / 1.29.3 / 1.30.1 / 1.31.1", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2018-September/090849.html" }, { "name": "1041695", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1041695" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T199029" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "mediawiki", "vendor": "mediawiki", "versions": [ { "status": "affected", "version": "1.31 before 1.31.1" } ] } ], "datePublic": "2018-09-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Mediawiki 1.31 before 1.31.1 misses .htaccess files in the provided tarball used to protect some directories that shouldn\u0027t be web accessible." } ], "problemTypes": [ { "descriptions": [ { "description": "missing .htaccess files in release tarball used to protect directories that shouldn\u0027t be web accessible.", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-05T09:57:01", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "name": "[wikitech-l] 20180920 Security release: 1.27.5 / 1.29.3 / 1.30.1 / 1.31.1", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2018-September/090849.html" }, { "name": "1041695", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1041695" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T199029" } ], "source": { "discovery": "UNKNOWN" }, "title": "Tarball was missing .htaccess files", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "DATE_PUBLIC": "2018-09-20T21:18:00.000Z", "ID": "CVE-2018-13258", "STATE": "PUBLIC", "TITLE": "Tarball was missing .htaccess files" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "mediawiki", "version": { "version_data": [ { "version_value": "1.31 before 1.31.1" } ] } } ] }, "vendor_name": "mediawiki" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Mediawiki 1.31 before 1.31.1 misses .htaccess files in the provided tarball used to protect some directories that shouldn\u0027t be web accessible." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "missing .htaccess files in release tarball used to protect directories that shouldn\u0027t be web accessible." } ] } ] }, "references": { "reference_data": [ { "name": "[wikitech-l] 20180920 Security release: 1.27.5 / 1.29.3 / 1.30.1 / 1.31.1", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2018-September/090849.html" }, { "name": "1041695", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041695" }, { "name": "https://phabricator.wikimedia.org/T199029", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T199029" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2018-13258", "datePublished": "2018-10-04T20:00:00Z", "dateReserved": "2018-07-05T00:00:00", "dateUpdated": "2024-09-16T23:21:06.293Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-1054
Vulnerability from cvelistv5
Published
2007-02-21 23:00
Modified
2024-08-07 12:43
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in the AJAX features in index.php in MediaWiki 1.6.x through 1.9.2, when $wgUseAjax is enabled, allows remote attackers to inject arbitrary web script or HTML via a UTF-7 encoded value of the rs parameter, which is processed by Internet Explorer.
References
▼ | URL | Tags |
---|---|---|
http://www.bugsec.com/articles.php?Security=24 | x_refsource_MISC | |
http://www.securityfocus.com/archive/1/460596/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://osvdb.org/32078 | vdb-entry, x_refsource_OSVDB | |
http://www.vupen.com/english/advisories/2007/0678 | vdb-entry, x_refsource_VUPEN | |
http://securityreason.com/securityalert/2274 | third-party-advisory, x_refsource_SREASON | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/32586 | vdb-entry, x_refsource_XF | |
http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_9_3/phase3/RELEASE-NOTES | x_refsource_CONFIRM | |
http://attrition.org/pipermail/vim/2007-February/001367.html | mailing-list, x_refsource_VIM | |
http://sourceforge.net/project/shownotes.php?release_id=487921&group_id=34373 | x_refsource_CONFIRM | |
http://secunia.com/advisories/24211 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T12:43:22.535Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.bugsec.com/articles.php?Security=24" }, { "name": "20070220 MediaWiki Cross-site Scripting", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/460596/100/0/threaded" }, { "name": "32078", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/32078" }, { "name": "ADV-2007-0678", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/0678" }, { "name": "2274", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/2274" }, { "name": "mediawiki-index-xss(32586)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32586" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_9_3/phase3/RELEASE-NOTES" }, { "name": "20070221 [unsure] MediaWiki Cross-site Scripting", "tags": [ "mailing-list", "x_refsource_VIM", "x_transferred" ], "url": "http://attrition.org/pipermail/vim/2007-February/001367.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sourceforge.net/project/shownotes.php?release_id=487921\u0026group_id=34373" }, { "name": "24211", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24211" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-02-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the AJAX features in index.php in MediaWiki 1.6.x through 1.9.2, when $wgUseAjax is enabled, allows remote attackers to inject arbitrary web script or HTML via a UTF-7 encoded value of the rs parameter, which is processed by Internet Explorer." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.bugsec.com/articles.php?Security=24" }, { "name": "20070220 MediaWiki Cross-site Scripting", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/460596/100/0/threaded" }, { "name": "32078", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/32078" }, { "name": "ADV-2007-0678", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/0678" }, { "name": "2274", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/2274" }, { "name": "mediawiki-index-xss(32586)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32586" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_9_3/phase3/RELEASE-NOTES" }, { "name": "20070221 [unsure] MediaWiki Cross-site Scripting", "tags": [ "mailing-list", "x_refsource_VIM" ], "url": "http://attrition.org/pipermail/vim/2007-February/001367.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sourceforge.net/project/shownotes.php?release_id=487921\u0026group_id=34373" }, { "name": "24211", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24211" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-1054", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the AJAX features in index.php in MediaWiki 1.6.x through 1.9.2, when $wgUseAjax is enabled, allows remote attackers to inject arbitrary web script or HTML via a UTF-7 encoded value of the rs parameter, which is processed by Internet Explorer." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.bugsec.com/articles.php?Security=24", "refsource": "MISC", "url": "http://www.bugsec.com/articles.php?Security=24" }, { "name": "20070220 MediaWiki Cross-site Scripting", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/460596/100/0/threaded" }, { "name": "32078", "refsource": "OSVDB", "url": "http://osvdb.org/32078" }, { "name": "ADV-2007-0678", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/0678" }, { "name": "2274", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/2274" }, { "name": "mediawiki-index-xss(32586)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32586" }, { "name": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_9_3/phase3/RELEASE-NOTES", "refsource": "CONFIRM", "url": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_9_3/phase3/RELEASE-NOTES" }, { "name": "20070221 [unsure] MediaWiki Cross-site Scripting", "refsource": "VIM", "url": "http://attrition.org/pipermail/vim/2007-February/001367.html" }, { "name": "http://sourceforge.net/project/shownotes.php?release_id=487921\u0026group_id=34373", "refsource": "CONFIRM", "url": "http://sourceforge.net/project/shownotes.php?release_id=487921\u0026group_id=34373" }, { "name": "24211", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24211" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-1054", "datePublished": "2007-02-21T23:00:00", "dateReserved": "2007-02-21T00:00:00", "dateUpdated": "2024-08-07T12:43:22.535Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-4303
Vulnerability from cvelistv5
Published
2019-12-11 18:30
Modified
2024-08-06 16:38
Severity ?
EPSS score ?
Summary
includes/libs/IEUrlExtension.php in the MediaWiki API in MediaWiki 1.19.x before 1.19.8, 1.20.x before 1.20.7, and 1.21.x before 1.21.2 does not properly detect extensions when there are an even number of "." (period) characters in a string, which allows remote attackers to conduct cross-site scripting (XSS) attacks via the siprop parameter in a query action to wiki/api.php.
References
▼ | URL | Tags |
---|---|---|
http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-September/000133.html | x_refsource_MISC | |
http://seclists.org/oss-sec/2013/q3/553 | x_refsource_MISC | |
https://bugzilla.wikimedia.org/show_bug.cgi?id=52746 | x_refsource_MISC | |
http://www.securityfocus.com/bid/62194 | x_refsource_MISC | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/86897 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Wikimedia Foundation | MediaWiki |
Version: 1.19.x before 1.19.8 Version: 1.20.x before 1.20.7 Version: and 1.21.x before 1.21.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:38:01.957Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-September/000133.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://seclists.org/oss-sec/2013/q3/553" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=52746" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.securityfocus.com/bid/62194" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86897" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "MediaWiki", "vendor": "Wikimedia Foundation", "versions": [ { "status": "affected", "version": "1.19.x before 1.19.8" }, { "status": "affected", "version": "1.20.x before 1.20.7" }, { "status": "affected", "version": "and 1.21.x before 1.21.2" } ] } ], "datePublic": "2013-09-03T00:00:00", "descriptions": [ { "lang": "en", "value": "includes/libs/IEUrlExtension.php in the MediaWiki API in MediaWiki 1.19.x before 1.19.8, 1.20.x before 1.20.7, and 1.21.x before 1.21.2 does not properly detect extensions when there are an even number of \".\" (period) characters in a string, which allows remote attackers to conduct cross-site scripting (XSS) attacks via the siprop parameter in a query action to wiki/api.php." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-Site Scripting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-12-11T18:30:37", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-September/000133.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://seclists.org/oss-sec/2013/q3/553" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=52746" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.securityfocus.com/bid/62194" }, { "tags": [ "x_refsource_MISC" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86897" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4303", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "MediaWiki", "version": { "version_data": [ { "version_value": "1.19.x before 1.19.8" }, { "version_value": "1.20.x before 1.20.7" }, { "version_value": "and 1.21.x before 1.21.2" } ] } } ] }, "vendor_name": "Wikimedia Foundation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "includes/libs/IEUrlExtension.php in the MediaWiki API in MediaWiki 1.19.x before 1.19.8, 1.20.x before 1.20.7, and 1.21.x before 1.21.2 does not properly detect extensions when there are an even number of \".\" (period) characters in a string, which allows remote attackers to conduct cross-site scripting (XSS) attacks via the siprop parameter in a query action to wiki/api.php." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross-Site Scripting" } ] } ] }, "references": { "reference_data": [ { "name": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-September/000133.html", "refsource": "MISC", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-September/000133.html" }, { "name": "http://seclists.org/oss-sec/2013/q3/553", "refsource": "MISC", "url": "http://seclists.org/oss-sec/2013/q3/553" }, { "name": "https://bugzilla.wikimedia.org/show_bug.cgi?id=52746", "refsource": "MISC", "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=52746" }, { "name": "http://www.securityfocus.com/bid/62194", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/62194" }, { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86897", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86897" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-4303", "datePublished": "2019-12-11T18:30:37", "dateReserved": "2013-06-12T00:00:00", "dateUpdated": "2024-08-06T16:38:01.957Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-25812
Vulnerability from cvelistv5
Published
2020-09-27 20:25
Modified
2024-08-04 15:40
Severity ?
EPSS score ?
Summary
An issue was discovered in MediaWiki 1.34.x before 1.34.4. On Special:Contributions, the NS filter uses unescaped messages as keys in the option key for an HTMLForm specifier. This is vulnerable to a mild XSS if one of those messages is changed to include raw HTML.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:40:36.959Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/g/mediawiki/core/+/ad4a3ba45fb955aa8c0eb3c83809b16b40a498b9/includes/specials/SpecialContributions.php#592" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html" }, { "name": "FEDORA-2020-a4802c53d9", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RTTPZ7XMDS66I442OLLHXBDNP2LCBJU6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MediaWiki 1.34.x before 1.34.4. On Special:Contributions, the NS filter uses unescaped messages as keys in the option key for an HTMLForm specifier. This is vulnerable to a mild XSS if one of those messages is changed to include raw HTML." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-14T02:06:09", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/g/mediawiki/core/+/ad4a3ba45fb955aa8c0eb3c83809b16b40a498b9/includes/specials/SpecialContributions.php#592" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html" }, { "name": "FEDORA-2020-a4802c53d9", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RTTPZ7XMDS66I442OLLHXBDNP2LCBJU6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-25812", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in MediaWiki 1.34.x before 1.34.4. On Special:Contributions, the NS filter uses unescaped messages as keys in the option key for an HTMLForm specifier. This is vulnerable to a mild XSS if one of those messages is changed to include raw HTML." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://gerrit.wikimedia.org/g/mediawiki/core/+/ad4a3ba45fb955aa8c0eb3c83809b16b40a498b9/includes/specials/SpecialContributions.php#592", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/g/mediawiki/core/+/ad4a3ba45fb955aa8c0eb3c83809b16b40a498b9/includes/specials/SpecialContributions.php#592" }, { "name": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html", "refsource": "CONFIRM", "url": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html" }, { "name": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html", "refsource": "MISC", "url": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html" }, { "name": "FEDORA-2020-a4802c53d9", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RTTPZ7XMDS66I442OLLHXBDNP2LCBJU6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-25812", "datePublished": "2020-09-27T20:25:18", "dateReserved": "2020-09-23T00:00:00", "dateUpdated": "2024-08-04T15:40:36.959Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-40602
Vulnerability from cvelistv5
Published
2024-07-06 00:00
Modified
2024-08-02 04:33
Severity ?
EPSS score ?
Summary
An issue was discovered in the Tempo skin for MediaWiki through 1.42.1. There is stored XSS via MediaWiki:Sidebar top-level menu entries.
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-40602", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-08T13:55:26.890064Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-08T13:55:36.178Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T04:33:11.962Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T361451" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the Tempo skin for MediaWiki through 1.42.1. There is stored XSS via MediaWiki:Sidebar top-level menu entries." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-06T23:26:55.969727", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T361451" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-40602", "datePublished": "2024-07-06T00:00:00", "dateReserved": "2024-07-06T00:00:00", "dateUpdated": "2024-08-02T04:33:11.962Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-29003
Vulnerability from cvelistv5
Published
2020-11-24 05:37
Modified
2024-08-04 16:48
Severity ?
EPSS score ?
Summary
The PollNY extension for MediaWiki through 1.35 allows XSS via an answer option for a poll question, entered during Special:CreatePoll or Special:UpdatePoll.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T266508 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:48:01.552Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T266508" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The PollNY extension for MediaWiki through 1.35 allows XSS via an answer option for a poll question, entered during Special:CreatePoll or Special:UpdatePoll." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-11-24T05:37:50", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T266508" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-29003", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The PollNY extension for MediaWiki through 1.35 allows XSS via an answer option for a poll question, entered during Special:CreatePoll or Special:UpdatePoll." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T266508", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T266508" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-29003", "datePublished": "2020-11-24T05:37:50", "dateReserved": "2020-11-24T00:00:00", "dateUpdated": "2024-08-04T16:48:01.552Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-45367
Vulnerability from cvelistv5
Published
2023-10-09 00:00
Modified
2024-09-19 18:04
Severity ?
EPSS score ?
Summary
An issue was discovered in the CheckUser extension for MediaWiki before 1.35.12, 1.36.x through 1.39.x before 1.39.5, and 1.40.x before 1.40.1. A user can use a rest.php/checkuser/v0/useragent-clienthints/revision/ URL to store an arbitrary number of rows in cu_useragent_clienthints, leading to a denial of service.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:21:16.751Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T344923" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-45367", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-19T18:04:37.276629Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-19T18:04:49.060Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the CheckUser extension for MediaWiki before 1.35.12, 1.36.x through 1.39.x before 1.39.5, and 1.40.x before 1.40.1. A user can use a rest.php/checkuser/v0/useragent-clienthints/revision/ URL to store an arbitrary number of rows in cu_useragent_clienthints, leading to a denial of service." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-09T04:45:59.629445", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T344923" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-45367", "datePublished": "2023-10-09T00:00:00", "dateReserved": "2023-10-09T00:00:00", "dateUpdated": "2024-09-19T18:04:49.060Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-25828
Vulnerability from cvelistv5
Published
2020-09-27 20:31
Modified
2024-08-04 15:40
Severity ?
EPSS score ?
Summary
An issue was discovered in MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4. The non-jqueryMsg version of mw.message().parse() doesn't escape HTML. This affects both message contents (which are generally safe) and the parameters (which can be based on user input). (When jqueryMsg is loaded, it correctly accepts only whitelisted tags in message contents, and escapes all parameters. Situations with an unloaded jqueryMsg are rare in practice, but can for example occur for Special:SpecialPages on a wiki with no extensions installed.)
References
▼ | URL | Tags |
---|---|---|
https://lists.wikimedia.org/pipermail/mediawiki-announce | x_refsource_MISC | |
https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html | x_refsource_CONFIRM | |
https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html | x_refsource_MISC | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RTTPZ7XMDS66I442OLLHXBDNP2LCBJU6/ | vendor-advisory, x_refsource_FEDORA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:40:36.947Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html" }, { "name": "FEDORA-2020-a4802c53d9", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RTTPZ7XMDS66I442OLLHXBDNP2LCBJU6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4. The non-jqueryMsg version of mw.message().parse() doesn\u0027t escape HTML. This affects both message contents (which are generally safe) and the parameters (which can be based on user input). (When jqueryMsg is loaded, it correctly accepts only whitelisted tags in message contents, and escapes all parameters. Situations with an unloaded jqueryMsg are rare in practice, but can for example occur for Special:SpecialPages on a wiki with no extensions installed.)" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-14T02:06:13", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html" }, { "name": "FEDORA-2020-a4802c53d9", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RTTPZ7XMDS66I442OLLHXBDNP2LCBJU6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-25828", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4. The non-jqueryMsg version of mw.message().parse() doesn\u0027t escape HTML. This affects both message contents (which are generally safe) and the parameters (which can be based on user input). (When jqueryMsg is loaded, it correctly accepts only whitelisted tags in message contents, and escapes all parameters. Situations with an unloaded jqueryMsg are rare in practice, but can for example occur for Special:SpecialPages on a wiki with no extensions installed.)" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://lists.wikimedia.org/pipermail/mediawiki-announce", "refsource": "MISC", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce" }, { "name": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html", "refsource": "CONFIRM", "url": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html" }, { "name": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html", "refsource": "MISC", "url": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html" }, { "name": "FEDORA-2020-a4802c53d9", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RTTPZ7XMDS66I442OLLHXBDNP2LCBJU6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-25828", "datePublished": "2020-09-27T20:31:44", "dateReserved": "2020-09-23T00:00:00", "dateUpdated": "2024-08-04T15:40:36.947Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-0003
Vulnerability from cvelistv5
Published
2011-01-11 01:00
Modified
2024-08-06 21:36
Severity ?
EPSS score ?
Summary
MediaWiki before 1.16.1, when user or site JavaScript or CSS is enabled, allows remote attackers to conduct clickjacking attacks via unspecified vectors.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:36:02.223Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20110104 Re: (possible) CVE request: Clickjacking in Mediawiki", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2011/01/04/12" }, { "name": "ADV-2011-0017", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0017" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=26561" }, { "name": "70272", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/70272" }, { "name": "FEDORA-2011-5807", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059235.html" }, { "name": "[MediaWiki-announce] 20110104 MediaWiki security release 1.16.1", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-January/000093.html" }, { "name": "[oss-security] 20110104 (possible) CVE request: Clickjacking in Mediawiki", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2011/01/04/6" }, { "name": "42810", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42810" }, { "name": "FEDORA-2011-5848", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058910.html" }, { "name": "mediawiki-frames-clickjacking(64476)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64476" }, { "name": "FEDORA-2011-5812", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059232.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-01-04T00:00:00", "descriptions": [ { "lang": "en", "value": "MediaWiki before 1.16.1, when user or site JavaScript or CSS is enabled, allows remote attackers to conduct clickjacking attacks via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[oss-security] 20110104 Re: (possible) CVE request: Clickjacking in Mediawiki", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2011/01/04/12" }, { "name": "ADV-2011-0017", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0017" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=26561" }, { "name": "70272", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/70272" }, { "name": "FEDORA-2011-5807", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059235.html" }, { "name": "[MediaWiki-announce] 20110104 MediaWiki security release 1.16.1", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-January/000093.html" }, { "name": "[oss-security] 20110104 (possible) CVE request: Clickjacking in Mediawiki", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2011/01/04/6" }, { "name": "42810", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42810" }, { "name": "FEDORA-2011-5848", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058910.html" }, { "name": "mediawiki-frames-clickjacking(64476)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64476" }, { "name": "FEDORA-2011-5812", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059232.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-0003", "datePublished": "2011-01-11T01:00:00", "dateReserved": "2010-12-07T00:00:00", "dateUpdated": "2024-08-06T21:36:02.223Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-45370
Vulnerability from cvelistv5
Published
2023-10-09 00:00
Modified
2024-09-19 17:58
Severity ?
EPSS score ?
Summary
An issue was discovered in the SportsTeams extension for MediaWiki before 1.35.12, 1.36.x through 1.39.x before 1.39.5, and 1.40.x before 1.40.1. SportsTeams: Special:SportsManagerLogo and Special:SportsTeamsManagerLogo do not check for the sportsteamsmanager user right, and thus an attacker may be able to affect pages that are concerned with sports teams.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:21:16.458Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T345680" }, { "tags": [ "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/SportsTeams/+/959699/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-45370", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-19T17:55:48.336136Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862 Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-19T17:58:01.047Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the SportsTeams extension for MediaWiki before 1.35.12, 1.36.x through 1.39.x before 1.39.5, and 1.40.x before 1.40.1. SportsTeams: Special:SportsManagerLogo and Special:SportsTeamsManagerLogo do not check for the sportsteamsmanager user right, and thus an attacker may be able to affect pages that are concerned with sports teams." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-09T05:32:56.540857", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T345680" }, { "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/SportsTeams/+/959699/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-45370", "datePublished": "2023-10-09T00:00:00", "dateReserved": "2023-10-09T00:00:00", "dateUpdated": "2024-09-19T17:58:01.047Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-9477
Vulnerability from cvelistv5
Published
2015-01-16 16:00
Modified
2024-08-06 13:47
Severity ?
EPSS score ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in the Listings extension for MediaWiki allow remote attackers to inject arbitrary web script or HTML via the (1) name or (2) url parameter.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T77624 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2015/01/03/13 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2014/12/21/2 | mailing-list, x_refsource_MLIST | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-December/000173.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:47:40.370Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T77624" }, { "name": "[oss-security] 20150103 Re: CVE Request: Mediawiki security releases 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/01/03/13" }, { "name": "[oss-security] 20141221 CVE Request: Mediawiki security releases 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/12/21/2" }, { "name": "[MediaWiki-announce] 20141217 MediaWiki Security and Maintenance Releases: 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-December/000173.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-12-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in the Listings extension for MediaWiki allow remote attackers to inject arbitrary web script or HTML via the (1) name or (2) url parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-01-16T15:57:01", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T77624" }, { "name": "[oss-security] 20150103 Re: CVE Request: Mediawiki security releases 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/01/03/13" }, { "name": "[oss-security] 20141221 CVE Request: Mediawiki security releases 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/12/21/2" }, { "name": "[MediaWiki-announce] 20141217 MediaWiki Security and Maintenance Releases: 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-December/000173.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "ID": "CVE-2014-9477", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in the Listings extension for MediaWiki allow remote attackers to inject arbitrary web script or HTML via the (1) name or (2) url parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T77624", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T77624" }, { "name": "[oss-security] 20150103 Re: CVE Request: Mediawiki security releases 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/01/03/13" }, { "name": "[oss-security] 20141221 CVE Request: Mediawiki security releases 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/12/21/2" }, { "name": "[MediaWiki-announce] 20141217 MediaWiki Security and Maintenance Releases: 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-December/000173.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2014-9477", "datePublished": "2015-01-16T16:00:00", "dateReserved": "2015-01-03T00:00:00", "dateUpdated": "2024-08-06T13:47:40.370Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-8627
Vulnerability from cvelistv5
Published
2017-03-23 20:00
Modified
2024-08-06 08:20
Severity ?
EPSS score ?
Summary
MediaWiki before 1.23.12, 1.24.x before 1.24.5, 1.25.x before 1.25.4, and 1.26.x before 1.26.1 do not properly normalize IP addresses containing zero-padded octets, which might allow remote attackers to bypass intended access restrictions by using an IP address that was not supposed to have been allowed.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T97897 | x_refsource_CONFIRM | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-December/000186.html | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2015/12/23/7 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2015/12/21/8 | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:20:43.575Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T97897" }, { "name": "[MediaWiki-announce] 20151221 [MediaWiki-announce] Security Release: 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-December/000186.html" }, { "name": "[oss-security] 20151223 Re: CVE requests for MediaWiki 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/12/23/7" }, { "name": "[oss-security] 20151221 CVE requests for MediaWiki 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/12/21/8" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-12-21T00:00:00", "descriptions": [ { "lang": "en", "value": "MediaWiki before 1.23.12, 1.24.x before 1.24.5, 1.25.x before 1.25.4, and 1.26.x before 1.26.1 do not properly normalize IP addresses containing zero-padded octets, which might allow remote attackers to bypass intended access restrictions by using an IP address that was not supposed to have been allowed." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-03-23T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T97897" }, { "name": "[MediaWiki-announce] 20151221 [MediaWiki-announce] Security Release: 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-December/000186.html" }, { "name": "[oss-security] 20151223 Re: CVE requests for MediaWiki 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/12/23/7" }, { "name": "[oss-security] 20151221 CVE requests for MediaWiki 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/12/21/8" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-8627", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MediaWiki before 1.23.12, 1.24.x before 1.24.5, 1.25.x before 1.25.4, and 1.26.x before 1.26.1 do not properly normalize IP addresses containing zero-padded octets, which might allow remote attackers to bypass intended access restrictions by using an IP address that was not supposed to have been allowed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T97897", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T97897" }, { "name": "[MediaWiki-announce] 20151221 [MediaWiki-announce] Security Release: 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-December/000186.html" }, { "name": "[oss-security] 20151223 Re: CVE requests for MediaWiki 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/12/23/7" }, { "name": "[oss-security] 20151221 CVE requests for MediaWiki 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/12/21/8" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-8627", "datePublished": "2017-03-23T20:00:00", "dateReserved": "2015-12-23T00:00:00", "dateUpdated": "2024-08-06T08:20:43.575Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-0788
Vulnerability from cvelistv5
Published
2007-02-06 19:00
Modified
2024-08-07 12:34
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in MediaWiki 1.9.x before 1.9.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to "sortable tables JavaScript."
References
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2007/0490 | vdb-entry, x_refsource_VUPEN | |
http://secunia.com/advisories/24039 | third-party-advisory, x_refsource_SECUNIA | |
http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_9_2/phase3/RELEASE-NOTES | x_refsource_CONFIRM | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2007-February/000059.html | mailing-list, x_refsource_MLIST | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/32217 | vdb-entry, x_refsource_XF | |
http://osvdb.org/33091 | vdb-entry, x_refsource_OSVDB | |
http://www.securityfocus.com/bid/22397 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T12:34:20.914Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2007-0490", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/0490" }, { "name": "24039", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24039" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_9_2/phase3/RELEASE-NOTES" }, { "name": "[MediaWiki-announce] 20070204 MediaWiki 1.9.2 released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2007-February/000059.html" }, { "name": "mediawiki-sortabletable-xss(32217)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32217" }, { "name": "33091", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/33091" }, { "name": "22397", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/22397" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-02-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in MediaWiki 1.9.x before 1.9.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to \"sortable tables JavaScript.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2007-0490", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/0490" }, { "name": "24039", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24039" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_9_2/phase3/RELEASE-NOTES" }, { "name": "[MediaWiki-announce] 20070204 MediaWiki 1.9.2 released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2007-February/000059.html" }, { "name": "mediawiki-sortabletable-xss(32217)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32217" }, { "name": "33091", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/33091" }, { "name": "22397", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/22397" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-0788", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in MediaWiki 1.9.x before 1.9.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to \"sortable tables JavaScript.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2007-0490", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/0490" }, { "name": "24039", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24039" }, { "name": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_9_2/phase3/RELEASE-NOTES", "refsource": "CONFIRM", "url": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_9_2/phase3/RELEASE-NOTES" }, { "name": "[MediaWiki-announce] 20070204 MediaWiki 1.9.2 released", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2007-February/000059.html" }, { "name": "mediawiki-sortabletable-xss(32217)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32217" }, { "name": "33091", "refsource": "OSVDB", "url": "http://osvdb.org/33091" }, { "name": "22397", "refsource": "BID", "url": "http://www.securityfocus.com/bid/22397" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-0788", "datePublished": "2007-02-06T19:00:00", "dateReserved": "2007-02-06T00:00:00", "dateUpdated": "2024-08-07T12:34:20.914Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-8003
Vulnerability from cvelistv5
Published
2015-11-09 18:00
Modified
2024-08-06 08:06
Severity ?
EPSS score ?
Summary
MediaWiki before 1.23.11, 1.24.x before 1.24.4, and 1.25.x before 1.25.3 does not throttle file uploads, which allows remote authenticated users to have unspecified impact via multiple file uploads.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1034028 | vdb-entry, x_refsource_SECTRACK | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-October/000181.html | mailing-list, x_refsource_MLIST | |
https://phabricator.wikimedia.org/T91850 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:06:31.578Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1034028", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1034028" }, { "name": "[MediaWiki-announce] 20151016 Security Release: 1.25.3, 1.24.4 and 1.23.11", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-October/000181.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T91850" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-10-16T00:00:00", "descriptions": [ { "lang": "en", "value": "MediaWiki before 1.23.11, 1.24.x before 1.24.4, and 1.25.x before 1.25.3 does not throttle file uploads, which allows remote authenticated users to have unspecified impact via multiple file uploads." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-11-09T17:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1034028", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1034028" }, { "name": "[MediaWiki-announce] 20151016 Security Release: 1.25.3, 1.24.4 and 1.23.11", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-October/000181.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T91850" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-8003", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MediaWiki before 1.23.11, 1.24.x before 1.24.4, and 1.25.x before 1.25.3 does not throttle file uploads, which allows remote authenticated users to have unspecified impact via multiple file uploads." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1034028", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034028" }, { "name": "[MediaWiki-announce] 20151016 Security Release: 1.25.3, 1.24.4 and 1.23.11", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-October/000181.html" }, { "name": "https://phabricator.wikimedia.org/T91850", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T91850" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-8003", "datePublished": "2015-11-09T18:00:00", "dateReserved": "2015-10-28T00:00:00", "dateUpdated": "2024-08-06T08:06:31.578Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28201
Vulnerability from cvelistv5
Published
2022-09-19 00:00
Modified
2024-08-03 05:48
Severity ?
EPSS score ?
Summary
An issue was discovered in MediaWiki before 1.35.6, 1.36.x before 1.36.4, and 1.37.x before 1.37.2. Users with the editinterface permission can trigger infinite recursion, because a bare local interwiki is mishandled for the mainpage message.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:48:37.479Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T297571" }, { "tags": [ "x_transferred" ], "url": "https://blog.legoktm.com/2022/07/03/a-belated-writeup-of-cve-2022-28201-in-mediawiki.html" }, { "name": "[debian-lts-announce] 20220922 [SECURITY] [DLA 3117-1] mediawiki security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00027.html" }, { "name": "DSA-5246", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2022/dsa-5246" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MediaWiki before 1.35.6, 1.36.x before 1.36.4, and 1.37.x before 1.37.2. Users with the editinterface permission can trigger infinite recursion, because a bare local interwiki is mishandled for the mainpage message." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-06T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T297571" }, { "url": "https://blog.legoktm.com/2022/07/03/a-belated-writeup-of-cve-2022-28201-in-mediawiki.html" }, { "name": "[debian-lts-announce] 20220922 [SECURITY] [DLA 3117-1] mediawiki security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00027.html" }, { "name": "DSA-5246", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2022/dsa-5246" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-28201", "datePublished": "2022-09-19T00:00:00", "dateReserved": "2022-03-30T00:00:00", "dateUpdated": "2024-08-03T05:48:37.479Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-2665
Vulnerability from cvelistv5
Published
2014-04-20 01:00
Modified
2024-08-06 10:21
Severity ?
EPSS score ?
Summary
includes/specials/SpecialChangePassword.php in MediaWiki before 1.19.14, 1.20.x and 1.21.x before 1.21.8, and 1.22.x before 1.22.5 does not properly handle a correctly authenticated but unintended login attempt, which makes it easier for remote authenticated users to obtain sensitive information by arranging for a victim to login to the attacker's account, as demonstrated by tracking the victim's activity, related to a "login CSRF" issue.
References
▼ | URL | Tags |
---|---|---|
https://bugzilla.wikimedia.org/show_bug.cgi?id=62497 | x_refsource_CONFIRM | |
http://openwall.com/lists/oss-security/2014/03/28/1 | mailing-list, x_refsource_MLIST | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-March/000145.html | mailing-list, x_refsource_MLIST | |
http://openwall.com/lists/oss-security/2014/04/01/7 | mailing-list, x_refsource_MLIST | |
https://gerrit.wikimedia.org/r/#/c/121517/1/includes/specials/SpecialChangePassword.php | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:21:35.971Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=62497" }, { "name": "[oss-security] 20140327 CVE request: MediaWiki 1.22.5 login csrf", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2014/03/28/1" }, { "name": "[mediawiki-announce] 20140328 MediaWiki Security and Maintenance Releases: 1.22.5, 1.21.8 and 1.19.14", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-March/000145.html" }, { "name": "[oss-security] 20140401 Re: CVE request: MediaWiki 1.22.5 login csrf", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2014/04/01/7" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/#/c/121517/1/includes/specials/SpecialChangePassword.php" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-03-27T00:00:00", "descriptions": [ { "lang": "en", "value": "includes/specials/SpecialChangePassword.php in MediaWiki before 1.19.14, 1.20.x and 1.21.x before 1.21.8, and 1.22.x before 1.22.5 does not properly handle a correctly authenticated but unintended login attempt, which makes it easier for remote authenticated users to obtain sensitive information by arranging for a victim to login to the attacker\u0027s account, as demonstrated by tracking the victim\u0027s activity, related to a \"login CSRF\" issue." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-04-20T01:57:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=62497" }, { "name": "[oss-security] 20140327 CVE request: MediaWiki 1.22.5 login csrf", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2014/03/28/1" }, { "name": "[mediawiki-announce] 20140328 MediaWiki Security and Maintenance Releases: 1.22.5, 1.21.8 and 1.19.14", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-March/000145.html" }, { "name": "[oss-security] 20140401 Re: CVE request: MediaWiki 1.22.5 login csrf", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2014/04/01/7" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://gerrit.wikimedia.org/r/#/c/121517/1/includes/specials/SpecialChangePassword.php" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-2665", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "includes/specials/SpecialChangePassword.php in MediaWiki before 1.19.14, 1.20.x and 1.21.x before 1.21.8, and 1.22.x before 1.22.5 does not properly handle a correctly authenticated but unintended login attempt, which makes it easier for remote authenticated users to obtain sensitive information by arranging for a victim to login to the attacker\u0027s account, as demonstrated by tracking the victim\u0027s activity, related to a \"login CSRF\" issue." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.wikimedia.org/show_bug.cgi?id=62497", "refsource": "CONFIRM", "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=62497" }, { "name": "[oss-security] 20140327 CVE request: MediaWiki 1.22.5 login csrf", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2014/03/28/1" }, { "name": "[mediawiki-announce] 20140328 MediaWiki Security and Maintenance Releases: 1.22.5, 1.21.8 and 1.19.14", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-March/000145.html" }, { "name": "[oss-security] 20140401 Re: CVE request: MediaWiki 1.22.5 login csrf", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2014/04/01/7" }, { "name": "https://gerrit.wikimedia.org/r/#/c/121517/1/includes/specials/SpecialChangePassword.php", "refsource": "CONFIRM", "url": "https://gerrit.wikimedia.org/r/#/c/121517/1/includes/specials/SpecialChangePassword.php" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-2665", "datePublished": "2014-04-20T01:00:00", "dateReserved": "2014-03-26T00:00:00", "dateUpdated": "2024-08-06T10:21:35.971Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-30157
Vulnerability from cvelistv5
Published
2021-04-06 06:43
Modified
2024-08-03 22:24
Severity ?
EPSS score ?
Summary
An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. On ChangesList special pages such as Special:RecentChanges and Special:Watchlist, some of the rcfilters-filter-* label messages are output in HTML unescaped, leading to XSS.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T278058 | x_refsource_MISC | |
https://www.debian.org/security/2021/dsa-4889 | vendor-advisory, x_refsource_DEBIAN | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/26UJGHF7LJDOCQN6A3Z4PM7PYRKENJHE/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2OMSV7B2TCFBOCICN3B4SMQP5HVRJQIT/ | vendor-advisory, x_refsource_FEDORA | |
https://security.gentoo.org/glsa/202107-40 | vendor-advisory, x_refsource_GENTOO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T22:24:59.662Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T278058" }, { "name": "DSA-4889", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2021/dsa-4889" }, { "name": "FEDORA-2021-f4223b6684", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/26UJGHF7LJDOCQN6A3Z4PM7PYRKENJHE/" }, { "name": "FEDORA-2021-d298103d3a", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2OMSV7B2TCFBOCICN3B4SMQP5HVRJQIT/" }, { "name": "GLSA-202107-40", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202107-40" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. On ChangesList special pages such as Special:RecentChanges and Special:Watchlist, some of the rcfilters-filter-* label messages are output in HTML unescaped, leading to XSS." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-17T07:06:29", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T278058" }, { "name": "DSA-4889", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2021/dsa-4889" }, { "name": "FEDORA-2021-f4223b6684", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/26UJGHF7LJDOCQN6A3Z4PM7PYRKENJHE/" }, { "name": "FEDORA-2021-d298103d3a", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2OMSV7B2TCFBOCICN3B4SMQP5HVRJQIT/" }, { "name": "GLSA-202107-40", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202107-40" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-30157", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. On ChangesList special pages such as Special:RecentChanges and Special:Watchlist, some of the rcfilters-filter-* label messages are output in HTML unescaped, leading to XSS." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T278058", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T278058" }, { "name": "DSA-4889", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4889" }, { "name": "FEDORA-2021-f4223b6684", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/26UJGHF7LJDOCQN6A3Z4PM7PYRKENJHE/" }, { "name": "FEDORA-2021-d298103d3a", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2OMSV7B2TCFBOCICN3B4SMQP5HVRJQIT/" }, { "name": "GLSA-202107-40", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202107-40" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-30157", "datePublished": "2021-04-06T06:43:05", "dateReserved": "2021-04-06T00:00:00", "dateUpdated": "2024-08-03T22:24:59.662Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-2934
Vulnerability from cvelistv5
Published
2015-04-13 14:00
Modified
2024-08-06 05:32
Severity ?
EPSS score ?
Summary
MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2 does not properly handle when the Zend interpreter xml_parse function does not expand entities, which allows remote attackers to inject arbitrary web script or HTML via a crafted SVG file.
References
▼ | URL | Tags |
---|---|---|
https://security.gentoo.org/glsa/201510-05 | vendor-advisory, x_refsource_GENTOO | |
http://www.mandriva.com/security/advisories?name=MDVSA-2015:200 | vendor-advisory, x_refsource_MANDRIVA | |
http://www.securityfocus.com/bid/73477 | vdb-entry, x_refsource_BID | |
http://www.openwall.com/lists/oss-security/2015/04/07/3 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2015/04/01/1 | mailing-list, x_refsource_MLIST | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html | mailing-list, x_refsource_MLIST | |
https://phabricator.wikimedia.org/T88310 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:32:20.614Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201510-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201510-05" }, { "name": "MDVSA-2015:200", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:200" }, { "name": "73477", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/73477" }, { "name": "[oss-security] 20150407 Re: CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/04/07/3" }, { "name": "[oss-security] 20150331 CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/04/01/1" }, { "name": "[MediaWiki-announce] 20150331 MediaWiki Security and Maintenance Releases: 1.19.24, 1.23.9, and 1.24.2", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T88310" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-03-31T00:00:00", "descriptions": [ { "lang": "en", "value": "MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2 does not properly handle when the Zend interpreter xml_parse function does not expand entities, which allows remote attackers to inject arbitrary web script or HTML via a crafted SVG file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-05T21:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "GLSA-201510-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201510-05" }, { "name": "MDVSA-2015:200", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:200" }, { "name": "73477", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/73477" }, { "name": "[oss-security] 20150407 Re: CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/04/07/3" }, { "name": "[oss-security] 20150331 CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/04/01/1" }, { "name": "[MediaWiki-announce] 20150331 MediaWiki Security and Maintenance Releases: 1.19.24, 1.23.9, and 1.24.2", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T88310" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-2934", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2 does not properly handle when the Zend interpreter xml_parse function does not expand entities, which allows remote attackers to inject arbitrary web script or HTML via a crafted SVG file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201510-05", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201510-05" }, { "name": "MDVSA-2015:200", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:200" }, { "name": "73477", "refsource": "BID", "url": "http://www.securityfocus.com/bid/73477" }, { "name": "[oss-security] 20150407 Re: CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/04/07/3" }, { "name": "[oss-security] 20150331 CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/04/01/1" }, { "name": "[MediaWiki-announce] 20150331 MediaWiki Security and Maintenance Releases: 1.19.24, 1.23.9, and 1.24.2", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html" }, { "name": "https://phabricator.wikimedia.org/T88310", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T88310" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-2934", "datePublished": "2015-04-13T14:00:00", "dateReserved": "2015-04-07T00:00:00", "dateUpdated": "2024-08-06T05:32:20.614Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28203
Vulnerability from cvelistv5
Published
2022-09-19 00:00
Modified
2024-08-03 05:48
Severity ?
EPSS score ?
Summary
A denial-of-service issue was discovered in MediaWiki before 1.35.6, 1.36.x before 1.36.4, and 1.37.x before 1.37.2. When many files exist, requesting Special:NewFiles with actor as a condition can result in a very long running query.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T297731 | ||
https://lists.debian.org/debian-lts-announce/2022/09/msg00027.html | mailing-list | |
https://www.debian.org/security/2022/dsa-5246 | vendor-advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:48:37.549Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T297731" }, { "name": "[debian-lts-announce] 20220922 [SECURITY] [DLA 3117-1] mediawiki security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00027.html" }, { "name": "DSA-5246", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2022/dsa-5246" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A denial-of-service issue was discovered in MediaWiki before 1.35.6, 1.36.x before 1.36.4, and 1.37.x before 1.37.2. When many files exist, requesting Special:NewFiles with actor as a condition can result in a very long running query." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-06T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T297731" }, { "name": "[debian-lts-announce] 20220922 [SECURITY] [DLA 3117-1] mediawiki security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00027.html" }, { "name": "DSA-5246", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2022/dsa-5246" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-28203", "datePublished": "2022-09-19T00:00:00", "dateReserved": "2022-03-30T00:00:00", "dateUpdated": "2024-08-03T05:48:37.549Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-41798
Vulnerability from cvelistv5
Published
2021-10-11 00:00
Modified
2024-08-04 03:22
Severity ?
EPSS score ?
Summary
MediaWiki before 1.36.2 allows XSS. Month related MediaWiki messages are not escaped before being used on the Special:Search results page.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:22:24.292Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T285515" }, { "name": "FEDORA-2021-eee8b7514f", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QNEAI2T3Y65I55ZB6UE6RMC662RZTGRX/" }, { "name": "FEDORA-2021-56d8173b5e", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CJDYJQWT43GBD6GNQ4OW7JOZ6WQ6DZTN/" }, { "name": "FEDORA-2021-3dd1b66cbf", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MDBPECBWN6LWNSWIQMVXK6PP4YFEUYHA/" }, { "name": "GLSA-202305-24", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202305-24" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "MediaWiki before 1.36.2 allows XSS. Month related MediaWiki messages are not escaped before being used on the Special:Search results page." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-21T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T285515" }, { "name": "FEDORA-2021-eee8b7514f", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QNEAI2T3Y65I55ZB6UE6RMC662RZTGRX/" }, { "name": "FEDORA-2021-56d8173b5e", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CJDYJQWT43GBD6GNQ4OW7JOZ6WQ6DZTN/" }, { "name": "FEDORA-2021-3dd1b66cbf", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MDBPECBWN6LWNSWIQMVXK6PP4YFEUYHA/" }, { "name": "GLSA-202305-24", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202305-24" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-41798", "datePublished": "2021-10-11T00:00:00", "dateReserved": "2021-09-29T00:00:00", "dateUpdated": "2024-08-04T03:22:24.292Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-23177
Vulnerability from cvelistv5
Published
2024-01-12 00:00
Modified
2024-08-01 22:59
Severity ?
EPSS score ?
Summary
An issue was discovered in the WatchAnalytics extension in MediaWiki before 1.40.2. XSS can occur via the Special:PageStatistics page parameter.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T22:59:32.079Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://lists.wikimedia.org/hyperkitty/list/mediawiki-announce%40lists.wikimedia.org/message/TDBUBCCOQJUT4SCHJNPHKQNPBUUETY52/" }, { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T348979" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the WatchAnalytics extension in MediaWiki before 1.40.2. XSS can occur via the Special:PageStatistics page parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-12T05:14:45.273401", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://lists.wikimedia.org/hyperkitty/list/mediawiki-announce%40lists.wikimedia.org/message/TDBUBCCOQJUT4SCHJNPHKQNPBUUETY52/" }, { "url": "https://phabricator.wikimedia.org/T348979" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-23177", "datePublished": "2024-01-12T00:00:00", "dateReserved": "2024-01-12T00:00:00", "dateUpdated": "2024-08-01T22:59:32.079Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-8002
Vulnerability from cvelistv5
Published
2015-11-09 18:00
Modified
2024-08-06 08:06
Severity ?
EPSS score ?
Summary
The chunked upload API (ApiUpload) in MediaWiki before 1.23.11, 1.24.x before 1.24.4, and 1.25.x before 1.25.3 allows remote authenticated users to cause a denial of service (disk consumption) via a file upload using one byte chunks.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T91205 | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1034028 | vdb-entry, x_refsource_SECTRACK | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-October/000181.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:06:31.576Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T91205" }, { "name": "1034028", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1034028" }, { "name": "[MediaWiki-announce] 20151016 Security Release: 1.25.3, 1.24.4 and 1.23.11", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-October/000181.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-10-16T00:00:00", "descriptions": [ { "lang": "en", "value": "The chunked upload API (ApiUpload) in MediaWiki before 1.23.11, 1.24.x before 1.24.4, and 1.25.x before 1.25.3 allows remote authenticated users to cause a denial of service (disk consumption) via a file upload using one byte chunks." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-11-09T17:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T91205" }, { "name": "1034028", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1034028" }, { "name": "[MediaWiki-announce] 20151016 Security Release: 1.25.3, 1.24.4 and 1.23.11", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-October/000181.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-8002", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The chunked upload API (ApiUpload) in MediaWiki before 1.23.11, 1.24.x before 1.24.4, and 1.25.x before 1.25.3 allows remote authenticated users to cause a denial of service (disk consumption) via a file upload using one byte chunks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T91205", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T91205" }, { "name": "1034028", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034028" }, { "name": "[MediaWiki-announce] 20151016 Security Release: 1.25.3, 1.24.4 and 1.23.11", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-October/000181.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-8002", "datePublished": "2015-11-09T18:00:00", "dateReserved": "2015-10-28T00:00:00", "dateUpdated": "2024-08-06T08:06:31.576Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-25869
Vulnerability from cvelistv5
Published
2020-09-27 20:40
Modified
2024-08-04 15:49
Severity ?
EPSS score ?
Summary
An information leak was discovered in MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4. Handling of actor ID does not necessarily use the correct database or correct wiki.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T260485 | x_refsource_MISC | |
https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html | x_refsource_CONFIRM | |
https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html | x_refsource_MISC | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RTTPZ7XMDS66I442OLLHXBDNP2LCBJU6/ | vendor-advisory, x_refsource_FEDORA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:49:06.057Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T260485" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html" }, { "name": "FEDORA-2020-a4802c53d9", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RTTPZ7XMDS66I442OLLHXBDNP2LCBJU6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An information leak was discovered in MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4. Handling of actor ID does not necessarily use the correct database or correct wiki." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-14T02:06:07", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T260485" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html" }, { "name": "FEDORA-2020-a4802c53d9", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RTTPZ7XMDS66I442OLLHXBDNP2LCBJU6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-25869", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An information leak was discovered in MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4. Handling of actor ID does not necessarily use the correct database or correct wiki." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T260485", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T260485" }, { "name": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html", "refsource": "CONFIRM", "url": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html" }, { "name": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html", "refsource": "MISC", "url": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html" }, { "name": "FEDORA-2020-a4802c53d9", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RTTPZ7XMDS66I442OLLHXBDNP2LCBJU6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-25869", "datePublished": "2020-09-27T20:40:25", "dateReserved": "2020-09-24T00:00:00", "dateUpdated": "2024-08-04T15:49:06.057Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36127
Vulnerability from cvelistv5
Published
2021-07-02 13:00
Modified
2024-08-04 00:47
Severity ?
EPSS score ?
Summary
An issue was discovered in the CentralAuth extension in MediaWiki through 1.36. The Special:GlobalUserRights page provided search results which, for a suppressed MediaWiki user, were different than for any other user, thus easily disclosing suppressed accounts (which are supposed to be completely hidden).
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T285190 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/I4e4dbcad61e1d4f6fd8b038bf63d19c69081a8ec | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:47:43.853Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T285190" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/I4e4dbcad61e1d4f6fd8b038bf63d19c69081a8ec" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the CentralAuth extension in MediaWiki through 1.36. The Special:GlobalUserRights page provided search results which, for a suppressed MediaWiki user, were different than for any other user, thus easily disclosing suppressed accounts (which are supposed to be completely hidden)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-02T13:00:57", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T285190" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/I4e4dbcad61e1d4f6fd8b038bf63d19c69081a8ec" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-36127", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in the CentralAuth extension in MediaWiki through 1.36. The Special:GlobalUserRights page provided search results which, for a suppressed MediaWiki user, were different than for any other user, thus easily disclosing suppressed accounts (which are supposed to be completely hidden)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T285190", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T285190" }, { "name": "https://gerrit.wikimedia.org/r/q/I4e4dbcad61e1d4f6fd8b038bf63d19c69081a8ec", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/I4e4dbcad61e1d4f6fd8b038bf63d19c69081a8ec" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-36127", "datePublished": "2021-07-02T13:00:57", "dateReserved": "2021-07-02T00:00:00", "dateUpdated": "2024-08-04T00:47:43.853Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-37304
Vulnerability from cvelistv5
Published
2023-06-30 00:00
Modified
2024-11-26 16:16
Severity ?
EPSS score ?
Summary
An issue was discovered in the DoubleWiki extension for MediaWiki through 1.39.3. includes/DoubleWiki.php allows XSS via the column alignment feature.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:09:34.313Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T323651" }, { "tags": [ "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/DoubleWiki/+/932825" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-37304", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-26T16:16:46.800358Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-26T16:16:56.585Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the DoubleWiki extension for MediaWiki through 1.39.3. includes/DoubleWiki.php allows XSS via the column alignment feature." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-30T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T323651" }, { "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/DoubleWiki/+/932825" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-37304", "datePublished": "2023-06-30T00:00:00", "dateReserved": "2023-06-30T00:00:00", "dateUpdated": "2024-11-26T16:16:56.585Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-45371
Vulnerability from cvelistv5
Published
2023-10-09 00:00
Modified
2024-09-19 17:54
Severity ?
EPSS score ?
Summary
An issue was discovered in the Wikibase extension for MediaWiki before 1.35.12, 1.36.x through 1.39.x before 1.39.5, and 1.40.x before 1.40.1. There is no rate limit for merging items.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:21:16.675Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T345064" }, { "tags": [ "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Wikibase/+/961264" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-45371", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-19T17:54:17.749445Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-19T17:54:27.160Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the Wikibase extension for MediaWiki before 1.35.12, 1.36.x through 1.39.x before 1.39.5, and 1.40.x before 1.40.1. There is no rate limit for merging items." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-09T05:32:47.753496", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T345064" }, { "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Wikibase/+/961264" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-45371", "datePublished": "2023-10-09T00:00:00", "dateReserved": "2023-10-09T00:00:00", "dateUpdated": "2024-09-19T17:54:27.160Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-37300
Vulnerability from cvelistv5
Published
2023-06-30 00:00
Modified
2024-11-27 18:54
Severity ?
EPSS score ?
Summary
An issue was discovered in the CheckUserLog API in the CheckUser extension for MediaWiki through 1.39.3. There is incorrect access control for visibility of hidden users.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:09:34.069Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T330968" }, { "tags": [ "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/I993fdcae1fedb7dd543b35a477026bc727615b0a" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-37300", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-27T18:50:49.609709Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863 Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-27T18:54:20.196Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the CheckUserLog API in the CheckUser extension for MediaWiki through 1.39.3. There is incorrect access control for visibility of hidden users." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-30T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T330968" }, { "url": "https://gerrit.wikimedia.org/r/q/I993fdcae1fedb7dd543b35a477026bc727615b0a" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-37300", "datePublished": "2023-06-30T00:00:00", "dateReserved": "2023-06-30T00:00:00", "dateUpdated": "2024-11-27T18:54:20.196Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-16738
Vulnerability from cvelistv5
Published
2019-09-26 01:49
Modified
2024-08-05 01:24
Severity ?
EPSS score ?
Summary
In MediaWiki through 1.33.0, Special:Redirect allows information disclosure of suppressed usernames via a User ID Lookup.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T230402 | x_refsource_MISC | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7OMG3BMUHGWTAPYTK2NXM6CXF6FYLOUO/ | vendor-advisory, x_refsource_FEDORA | |
https://www.debian.org/security/2019/dsa-4545 | vendor-advisory, x_refsource_DEBIAN | |
https://seclists.org/bugtraq/2019/Oct/32 | mailing-list, x_refsource_BUGTRAQ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QBAOLXETM5BOYQG6OQVHGB2LNLZUXVN6/ | vendor-advisory, x_refsource_FEDORA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:24:48.186Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T230402" }, { "name": "FEDORA-2019-c4cdd73c74", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7OMG3BMUHGWTAPYTK2NXM6CXF6FYLOUO/" }, { "name": "DSA-4545", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2019/dsa-4545" }, { "name": "20191021 [SECURITY] [DSA 4545-1] mediawiki security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Oct/32" }, { "name": "FEDORA-2019-3ba38e1cdb", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QBAOLXETM5BOYQG6OQVHGB2LNLZUXVN6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In MediaWiki through 1.33.0, Special:Redirect allows information disclosure of suppressed usernames via a User ID Lookup." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-26T19:06:10", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T230402" }, { "name": "FEDORA-2019-c4cdd73c74", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7OMG3BMUHGWTAPYTK2NXM6CXF6FYLOUO/" }, { "name": "DSA-4545", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2019/dsa-4545" }, { "name": "20191021 [SECURITY] [DSA 4545-1] mediawiki security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Oct/32" }, { "name": "FEDORA-2019-3ba38e1cdb", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QBAOLXETM5BOYQG6OQVHGB2LNLZUXVN6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-16738", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In MediaWiki through 1.33.0, Special:Redirect allows information disclosure of suppressed usernames via a User ID Lookup." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T230402", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T230402" }, { "name": "FEDORA-2019-c4cdd73c74", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7OMG3BMUHGWTAPYTK2NXM6CXF6FYLOUO/" }, { "name": "DSA-4545", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2019/dsa-4545" }, { "name": "20191021 [SECURITY] [DSA 4545-1] mediawiki security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Oct/32" }, { "name": "FEDORA-2019-3ba38e1cdb", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QBAOLXETM5BOYQG6OQVHGB2LNLZUXVN6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-16738", "datePublished": "2019-09-26T01:49:11", "dateReserved": "2019-09-24T00:00:00", "dateUpdated": "2024-08-05T01:24:48.186Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-2937
Vulnerability from cvelistv5
Published
2015-04-13 14:00
Modified
2024-08-06 05:32
Severity ?
EPSS score ?
Summary
MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2, when using HHVM or Zend PHP, allows remote attackers to cause a denial of service ("quadratic blowup" and memory consumption) via an XML file containing an entity declaration with long replacement text and many references to this entity, a different vulnerability than CVE-2015-2942.
References
▼ | URL | Tags |
---|---|---|
https://security.gentoo.org/glsa/201510-05 | vendor-advisory, x_refsource_GENTOO | |
http://www.mandriva.com/security/advisories?name=MDVSA-2015:200 | vendor-advisory, x_refsource_MANDRIVA | |
http://www.securityfocus.com/bid/73477 | vdb-entry, x_refsource_BID | |
http://www.openwall.com/lists/oss-security/2015/04/07/3 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2015/04/01/1 | mailing-list, x_refsource_MLIST | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html | mailing-list, x_refsource_MLIST | |
https://phabricator.wikimedia.org/T71210 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:32:20.563Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201510-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201510-05" }, { "name": "MDVSA-2015:200", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:200" }, { "name": "73477", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/73477" }, { "name": "[oss-security] 20150407 Re: CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/04/07/3" }, { "name": "[oss-security] 20150331 CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/04/01/1" }, { "name": "[MediaWiki-announce] 20150331 MediaWiki Security and Maintenance Releases: 1.19.24, 1.23.9, and 1.24.2", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T71210" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-03-31T00:00:00", "descriptions": [ { "lang": "en", "value": "MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2, when using HHVM or Zend PHP, allows remote attackers to cause a denial of service (\"quadratic blowup\" and memory consumption) via an XML file containing an entity declaration with long replacement text and many references to this entity, a different vulnerability than CVE-2015-2942." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-05T21:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "GLSA-201510-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201510-05" }, { "name": "MDVSA-2015:200", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:200" }, { "name": "73477", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/73477" }, { "name": "[oss-security] 20150407 Re: CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/04/07/3" }, { "name": "[oss-security] 20150331 CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/04/01/1" }, { "name": "[MediaWiki-announce] 20150331 MediaWiki Security and Maintenance Releases: 1.19.24, 1.23.9, and 1.24.2", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T71210" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-2937", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2, when using HHVM or Zend PHP, allows remote attackers to cause a denial of service (\"quadratic blowup\" and memory consumption) via an XML file containing an entity declaration with long replacement text and many references to this entity, a different vulnerability than CVE-2015-2942." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201510-05", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201510-05" }, { "name": "MDVSA-2015:200", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:200" }, { "name": "73477", "refsource": "BID", "url": "http://www.securityfocus.com/bid/73477" }, { "name": "[oss-security] 20150407 Re: CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/04/07/3" }, { "name": "[oss-security] 20150331 CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/04/01/1" }, { "name": "[MediaWiki-announce] 20150331 MediaWiki Security and Maintenance Releases: 1.19.24, 1.23.9, and 1.24.2", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html" }, { "name": "https://phabricator.wikimedia.org/T71210", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T71210" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-2937", "datePublished": "2015-04-13T14:00:00", "dateReserved": "2015-04-07T00:00:00", "dateUpdated": "2024-08-06T05:32:20.563Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-5249
Vulnerability from cvelistv5
Published
2008-12-19 17:00
Modified
2024-08-07 10:49
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in MediaWiki 1.13.0 through 1.13.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01309.html | vendor-advisory, x_refsource_FEDORA | |
http://www.debian.org/security/2009/dsa-1901 | vendor-advisory, x_refsource_DEBIAN | |
http://secunia.com/advisories/33133 | third-party-advisory, x_refsource_SECUNIA | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2008-December/000080.html | mailing-list, x_refsource_MLIST | |
http://www.securityfocus.com/bid/32844 | vdb-entry, x_refsource_BID | |
https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01256.html | vendor-advisory, x_refsource_FEDORA | |
http://secunia.com/advisories/33349 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T10:49:11.973Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "FEDORA-2008-11802", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01309.html" }, { "name": "DSA-1901", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2009/dsa-1901" }, { "name": "33133", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33133" }, { "name": "[mediawiki-announce] 20081215 MediaWiki 1.13.3, 1.12.2, 1.6.11 security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2008-December/000080.html" }, { "name": "32844", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/32844" }, { "name": "FEDORA-2008-11688", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01256.html" }, { "name": "33349", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33349" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-12-15T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in MediaWiki 1.13.0 through 1.13.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-01-01T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "FEDORA-2008-11802", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01309.html" }, { "name": "DSA-1901", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2009/dsa-1901" }, { "name": "33133", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33133" }, { "name": "[mediawiki-announce] 20081215 MediaWiki 1.13.3, 1.12.2, 1.6.11 security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2008-December/000080.html" }, { "name": "32844", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/32844" }, { "name": "FEDORA-2008-11688", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01256.html" }, { "name": "33349", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33349" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-5249", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in MediaWiki 1.13.0 through 1.13.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "FEDORA-2008-11802", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01309.html" }, { "name": "DSA-1901", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2009/dsa-1901" }, { "name": "33133", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33133" }, { "name": "[mediawiki-announce] 20081215 MediaWiki 1.13.3, 1.12.2, 1.6.11 security update", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2008-December/000080.html" }, { "name": "32844", "refsource": "BID", "url": "http://www.securityfocus.com/bid/32844" }, { "name": "FEDORA-2008-11688", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01256.html" }, { "name": "33349", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33349" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-5249", "datePublished": "2008-12-19T17:00:00", "dateReserved": "2008-11-26T00:00:00", "dateUpdated": "2024-08-07T10:49:11.973Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-9479
Vulnerability from cvelistv5
Published
2015-01-16 16:00
Modified
2024-08-06 13:47
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in the preview in the TemplateSandbox extension for MediaWiki allows remote attackers to inject arbitrary web script or HTML via the text parameter to Special:TemplateSandbox.
References
▼ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2015/01/03/13 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2014/12/21/2 | mailing-list, x_refsource_MLIST | |
https://phabricator.wikimedia.org/T76195 | x_refsource_CONFIRM | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-December/000173.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:47:41.125Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20150103 Re: CVE Request: Mediawiki security releases 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/01/03/13" }, { "name": "[oss-security] 20141221 CVE Request: Mediawiki security releases 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/12/21/2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T76195" }, { "name": "[MediaWiki-announce] 20141217 MediaWiki Security and Maintenance Releases: 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-December/000173.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-12-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the preview in the TemplateSandbox extension for MediaWiki allows remote attackers to inject arbitrary web script or HTML via the text parameter to Special:TemplateSandbox." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-01-16T15:57:01", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "name": "[oss-security] 20150103 Re: CVE Request: Mediawiki security releases 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/01/03/13" }, { "name": "[oss-security] 20141221 CVE Request: Mediawiki security releases 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/12/21/2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T76195" }, { "name": "[MediaWiki-announce] 20141217 MediaWiki Security and Maintenance Releases: 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-December/000173.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "ID": "CVE-2014-9479", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the preview in the TemplateSandbox extension for MediaWiki allows remote attackers to inject arbitrary web script or HTML via the text parameter to Special:TemplateSandbox." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20150103 Re: CVE Request: Mediawiki security releases 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/01/03/13" }, { "name": "[oss-security] 20141221 CVE Request: Mediawiki security releases 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/12/21/2" }, { "name": "https://phabricator.wikimedia.org/T76195", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T76195" }, { "name": "[MediaWiki-announce] 20141217 MediaWiki Security and Maintenance Releases: 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-December/000173.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2014-9479", "datePublished": "2015-01-16T16:00:00", "dateReserved": "2015-01-03T00:00:00", "dateUpdated": "2024-08-06T13:47:41.125Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-1817
Vulnerability from cvelistv5
Published
2019-11-20 19:32
Modified
2024-08-06 15:13
Severity ?
EPSS score ?
Summary
MediaWiki before 1.19.4 and 1.20.x before 1.20.3 contains an error in the api.php script which allows remote attackers to obtain sensitive information.
References
▼ | URL | Tags |
---|---|---|
https://security-tracker.debian.org/tracker/CVE-2013-1817 | x_refsource_MISC | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1817 | x_refsource_MISC | |
http://www.securityfocus.com/bid/58305 | x_refsource_MISC | |
http://security.gentoo.org/glsa/glsa-201310-21.xml | x_refsource_MISC | |
http://www.openwall.com/lists/oss-security/2013/03/05/4 | x_refsource_MISC | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/88359 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:13:32.994Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-tracker.debian.org/tracker/CVE-2013-1817" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1817" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.securityfocus.com/bid/58305" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201310-21.xml" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2013/03/05/4" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/88359" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "mediawiki", "vendor": "mediawiki", "versions": [ { "status": "affected", "version": "1.19.4" }, { "status": "affected", "version": "1.20.3" } ] } ], "datePublic": "2013-03-04T00:00:00", "descriptions": [ { "lang": "en", "value": "MediaWiki before 1.19.4 and 1.20.x before 1.20.3 contains an error in the api.php script which allows remote attackers to obtain sensitive information." } ], "problemTypes": [ { "descriptions": [ { "description": "Other", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-20T19:32:38", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security-tracker.debian.org/tracker/CVE-2013-1817" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1817" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.securityfocus.com/bid/58305" }, { "tags": [ "x_refsource_MISC" ], "url": "http://security.gentoo.org/glsa/glsa-201310-21.xml" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.openwall.com/lists/oss-security/2013/03/05/4" }, { "tags": [ "x_refsource_MISC" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/88359" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-1817", "datePublished": "2019-11-20T19:32:38", "dateReserved": "2013-02-19T00:00:00", "dateUpdated": "2024-08-06T15:13:32.994Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-8624
Vulnerability from cvelistv5
Published
2017-03-23 20:00
Modified
2024-08-06 08:20
Severity ?
EPSS score ?
Summary
The User::matchEditToken function in includes/User.php in MediaWiki before 1.23.12, 1.24.x before 1.24.5, 1.25.x before 1.25.4, and 1.26.x before 1.26.1 does not perform token comparison in constant time before determining if a debugging message should be logged, which allows remote attackers to guess the edit token and bypass CSRF protection via a timing attack, a different vulnerability than CVE-2015-8623.
References
▼ | URL | Tags |
---|---|---|
https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-December/000186.html | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2015/12/23/7 | mailing-list, x_refsource_MLIST | |
https://phabricator.wikimedia.org/T119309 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2015/12/21/8 | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:20:43.559Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[MediaWiki-announce] 20151221 [MediaWiki-announce] Security Release: 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-December/000186.html" }, { "name": "[oss-security] 20151223 Re: CVE requests for MediaWiki 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/12/23/7" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T119309" }, { "name": "[oss-security] 20151221 CVE requests for MediaWiki 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/12/21/8" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-12-21T00:00:00", "descriptions": [ { "lang": "en", "value": "The User::matchEditToken function in includes/User.php in MediaWiki before 1.23.12, 1.24.x before 1.24.5, 1.25.x before 1.25.4, and 1.26.x before 1.26.1 does not perform token comparison in constant time before determining if a debugging message should be logged, which allows remote attackers to guess the edit token and bypass CSRF protection via a timing attack, a different vulnerability than CVE-2015-8623." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-03-23T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[MediaWiki-announce] 20151221 [MediaWiki-announce] Security Release: 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-December/000186.html" }, { "name": "[oss-security] 20151223 Re: CVE requests for MediaWiki 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/12/23/7" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T119309" }, { "name": "[oss-security] 20151221 CVE requests for MediaWiki 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/12/21/8" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-8624", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The User::matchEditToken function in includes/User.php in MediaWiki before 1.23.12, 1.24.x before 1.24.5, 1.25.x before 1.25.4, and 1.26.x before 1.26.1 does not perform token comparison in constant time before determining if a debugging message should be logged, which allows remote attackers to guess the edit token and bypass CSRF protection via a timing attack, a different vulnerability than CVE-2015-8623." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[MediaWiki-announce] 20151221 [MediaWiki-announce] Security Release: 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-December/000186.html" }, { "name": "[oss-security] 20151223 Re: CVE requests for MediaWiki 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/12/23/7" }, { "name": "https://phabricator.wikimedia.org/T119309", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T119309" }, { "name": "[oss-security] 20151221 CVE requests for MediaWiki 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/12/21/8" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-8624", "datePublished": "2017-03-23T20:00:00", "dateReserved": "2015-12-23T00:00:00", "dateUpdated": "2024-08-06T08:20:43.559Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-2935
Vulnerability from cvelistv5
Published
2015-04-13 14:00
Modified
2024-08-06 05:32
Severity ?
EPSS score ?
Summary
MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2 allows remote attackers to bypass the SVG filtering and obtain sensitive user information via a mixed case @import in a style element in an SVG file, as demonstrated by "@imporT."
References
▼ | URL | Tags |
---|---|---|
https://security.gentoo.org/glsa/201510-05 | vendor-advisory, x_refsource_GENTOO | |
http://www.mandriva.com/security/advisories?name=MDVSA-2015:200 | vendor-advisory, x_refsource_MANDRIVA | |
http://www.securityfocus.com/bid/73477 | vdb-entry, x_refsource_BID | |
http://www.openwall.com/lists/oss-security/2015/04/07/3 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2015/04/01/1 | mailing-list, x_refsource_MLIST | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html | mailing-list, x_refsource_MLIST | |
https://phabricator.wikimedia.org/T85349 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:32:20.590Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201510-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201510-05" }, { "name": "MDVSA-2015:200", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:200" }, { "name": "73477", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/73477" }, { "name": "[oss-security] 20150407 Re: CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/04/07/3" }, { "name": "[oss-security] 20150331 CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/04/01/1" }, { "name": "[MediaWiki-announce] 20150331 MediaWiki Security and Maintenance Releases: 1.19.24, 1.23.9, and 1.24.2", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T85349" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-03-31T00:00:00", "descriptions": [ { "lang": "en", "value": "MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2 allows remote attackers to bypass the SVG filtering and obtain sensitive user information via a mixed case @import in a style element in an SVG file, as demonstrated by \"@imporT.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-05T21:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "GLSA-201510-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201510-05" }, { "name": "MDVSA-2015:200", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:200" }, { "name": "73477", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/73477" }, { "name": "[oss-security] 20150407 Re: CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/04/07/3" }, { "name": "[oss-security] 20150331 CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/04/01/1" }, { "name": "[MediaWiki-announce] 20150331 MediaWiki Security and Maintenance Releases: 1.19.24, 1.23.9, and 1.24.2", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T85349" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-2935", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2 allows remote attackers to bypass the SVG filtering and obtain sensitive user information via a mixed case @import in a style element in an SVG file, as demonstrated by \"@imporT.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201510-05", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201510-05" }, { "name": "MDVSA-2015:200", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:200" }, { "name": "73477", "refsource": "BID", "url": "http://www.securityfocus.com/bid/73477" }, { "name": "[oss-security] 20150407 Re: CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/04/07/3" }, { "name": "[oss-security] 20150331 CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/04/01/1" }, { "name": "[MediaWiki-announce] 20150331 MediaWiki Security and Maintenance Releases: 1.19.24, 1.23.9, and 1.24.2", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html" }, { "name": "https://phabricator.wikimedia.org/T85349", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T85349" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-2935", "datePublished": "2015-04-13T14:00:00", "dateReserved": "2015-04-07T00:00:00", "dateUpdated": "2024-08-06T05:32:20.590Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2005-2396
Vulnerability from cvelistv5
Published
2005-07-27 04:00
Modified
2024-08-07 22:22
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in MediaWiki 1.4.6 and earlier allows remote attackers to inject arbitrary web script or HTML via a parameter to the page move template.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/21491 | vdb-entry, x_refsource_XF | |
http://www.osvdb.org/17763 | vdb-entry, x_refsource_OSVDB | |
http://secunia.com/advisories/15950 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/14327 | vdb-entry, x_refsource_BID | |
http://security.gentoo.org/glsa/glsa-200507-18.xml | vendor-advisory, x_refsource_GENTOO | |
http://secunia.com/advisories/16130 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T22:22:49.146Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "mediawiki-page-move-xss(21491)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21491" }, { "name": "17763", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/17763" }, { "name": "15950", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/15950" }, { "name": "14327", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/14327" }, { "name": "GLSA-200507-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200507-18.xml" }, { "name": "16130", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/16130" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-07-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in MediaWiki 1.4.6 and earlier allows remote attackers to inject arbitrary web script or HTML via a parameter to the page move template." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "mediawiki-page-move-xss(21491)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21491" }, { "name": "17763", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/17763" }, { "name": "15950", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/15950" }, { "name": "14327", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/14327" }, { "name": "GLSA-200507-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200507-18.xml" }, { "name": "16130", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/16130" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-2396", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in MediaWiki 1.4.6 and earlier allows remote attackers to inject arbitrary web script or HTML via a parameter to the page move template." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "mediawiki-page-move-xss(21491)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21491" }, { "name": "17763", "refsource": "OSVDB", "url": "http://www.osvdb.org/17763" }, { "name": "15950", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/15950" }, { "name": "14327", "refsource": "BID", "url": "http://www.securityfocus.com/bid/14327" }, { "name": "GLSA-200507-18", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200507-18.xml" }, { "name": "16130", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/16130" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-2396", "datePublished": "2005-07-27T04:00:00", "dateReserved": "2005-07-27T00:00:00", "dateUpdated": "2024-08-07T22:22:49.146Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-4305
Vulnerability from cvelistv5
Published
2013-10-11 21:00
Modified
2024-08-06 16:38
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in contrib/example.php in the SyntaxHighlight GeSHi extension for MediaWiki, possibly as downloaded before September 2013, allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO.
References
▼ | URL | Tags |
---|---|---|
http://seclists.org/oss-sec/2013/q3/553 | mailing-list, x_refsource_MLIST | |
https://bugzilla.wikimedia.org/show_bug.cgi?id=49070 | x_refsource_CONFIRM | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-September/000133.html | mailing-list, x_refsource_MLIST | |
http://osvdb.org/96909 | vdb-entry, x_refsource_OSVDB | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/86890 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:38:01.906Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20130904 Re: CVE request: MediaWiki Security Release: 1.21.2, 1.20.7 and 1.19.8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2013/q3/553" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=49070" }, { "name": "[MediaWiki-announce] 20130903 MediaWiki Security Release: 1.21.2, 1.20.7 and 1.19.8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-September/000133.html" }, { "name": "96909", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/96909" }, { "name": "mediawiki-cve20134305-xss(86890)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86890" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-09-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in contrib/example.php in the SyntaxHighlight GeSHi extension for MediaWiki, possibly as downloaded before September 2013, allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[oss-security] 20130904 Re: CVE request: MediaWiki Security Release: 1.21.2, 1.20.7 and 1.19.8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2013/q3/553" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=49070" }, { "name": "[MediaWiki-announce] 20130903 MediaWiki Security Release: 1.21.2, 1.20.7 and 1.19.8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-September/000133.html" }, { "name": "96909", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/96909" }, { "name": "mediawiki-cve20134305-xss(86890)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86890" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4305", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in contrib/example.php in the SyntaxHighlight GeSHi extension for MediaWiki, possibly as downloaded before September 2013, allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20130904 Re: CVE request: MediaWiki Security Release: 1.21.2, 1.20.7 and 1.19.8", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2013/q3/553" }, { "name": "https://bugzilla.wikimedia.org/show_bug.cgi?id=49070", "refsource": "CONFIRM", "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=49070" }, { "name": "[MediaWiki-announce] 20130903 MediaWiki Security Release: 1.21.2, 1.20.7 and 1.19.8", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-September/000133.html" }, { "name": "96909", "refsource": "OSVDB", "url": "http://osvdb.org/96909" }, { "name": "mediawiki-cve20134305-xss(86890)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86890" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-4305", "datePublished": "2013-10-11T21:00:00", "dateReserved": "2013-06-12T00:00:00", "dateUpdated": "2024-08-06T16:38:01.906Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36132
Vulnerability from cvelistv5
Published
2021-07-02 12:59
Modified
2024-08-04 00:47
Severity ?
EPSS score ?
Summary
An issue was discovered in the FileImporter extension in MediaWiki through 1.36. For certain relaxed configurations of the $wgFileImporterRequiredRight variable, it might not validate all appropriate user rights, thus allowing a user with insufficient rights to perform operations (specifically file uploads) that they should not be allowed to perform.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T280590 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/I8ff2a67abd2c118a3469e4410eac2a451bfa76c3 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:47:43.805Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T280590" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/I8ff2a67abd2c118a3469e4410eac2a451bfa76c3" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the FileImporter extension in MediaWiki through 1.36. For certain relaxed configurations of the $wgFileImporterRequiredRight variable, it might not validate all appropriate user rights, thus allowing a user with insufficient rights to perform operations (specifically file uploads) that they should not be allowed to perform." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-02T12:59:57", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T280590" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/I8ff2a67abd2c118a3469e4410eac2a451bfa76c3" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-36132", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in the FileImporter extension in MediaWiki through 1.36. For certain relaxed configurations of the $wgFileImporterRequiredRight variable, it might not validate all appropriate user rights, thus allowing a user with insufficient rights to perform operations (specifically file uploads) that they should not be allowed to perform." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T280590", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T280590" }, { "name": "https://gerrit.wikimedia.org/r/q/I8ff2a67abd2c118a3469e4410eac2a451bfa76c3", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/I8ff2a67abd2c118a3469e4410eac2a451bfa76c3" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-36132", "datePublished": "2021-07-02T12:59:57", "dateReserved": "2021-07-02T00:00:00", "dateUpdated": "2024-08-04T00:47:43.805Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-3966
Vulnerability from cvelistv5
Published
2014-06-06 14:00
Modified
2024-08-06 10:57
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in Special:PasswordReset in MediaWiki before 1.19.16, 1.21.x before 1.21.10, and 1.22.x before 1.22.7, when wgRawHtml is enabled, allows remote attackers to inject arbitrary web script or HTML via an invalid username.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/58896 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securitytracker.com/id/1030364 | vdb-entry, x_refsource_SECTRACK | |
http://www.openwall.com/lists/oss-security/2014/06/04/15 | mailing-list, x_refsource_MLIST | |
https://bugzilla.wikimedia.org/show_bug.cgi?id=65501 | x_refsource_CONFIRM | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-May/000151.html | mailing-list, x_refsource_MLIST | |
http://www.debian.org/security/2014/dsa-2957 | vendor-advisory, x_refsource_DEBIAN | |
http://www.securityfocus.com/bid/67787 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/58834 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:57:18.054Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "58896", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/58896" }, { "name": "1030364", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1030364" }, { "name": "[oss-security] 20140604 Re: CVE request: mediawiki invalid usernames on Special:PasswordReset were parsed as wikitext", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/06/04/15" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=65501" }, { "name": "[MediaWiki-announce] 20140529 MediaWiki Security and Maintenance Releases: 1.19.16, 1.21.10 and 1.22.7", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-May/000151.html" }, { "name": "DSA-2957", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-2957" }, { "name": "67787", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/67787" }, { "name": "58834", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/58834" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-05-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Special:PasswordReset in MediaWiki before 1.19.16, 1.21.x before 1.21.10, and 1.22.x before 1.22.7, when wgRawHtml is enabled, allows remote attackers to inject arbitrary web script or HTML via an invalid username." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-28T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "58896", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/58896" }, { "name": "1030364", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1030364" }, { "name": "[oss-security] 20140604 Re: CVE request: mediawiki invalid usernames on Special:PasswordReset were parsed as wikitext", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/06/04/15" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=65501" }, { "name": "[MediaWiki-announce] 20140529 MediaWiki Security and Maintenance Releases: 1.19.16, 1.21.10 and 1.22.7", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-May/000151.html" }, { "name": "DSA-2957", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-2957" }, { "name": "67787", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/67787" }, { "name": "58834", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/58834" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-3966", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in Special:PasswordReset in MediaWiki before 1.19.16, 1.21.x before 1.21.10, and 1.22.x before 1.22.7, when wgRawHtml is enabled, allows remote attackers to inject arbitrary web script or HTML via an invalid username." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "58896", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58896" }, { "name": "1030364", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1030364" }, { "name": "[oss-security] 20140604 Re: CVE request: mediawiki invalid usernames on Special:PasswordReset were parsed as wikitext", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/06/04/15" }, { "name": "https://bugzilla.wikimedia.org/show_bug.cgi?id=65501", "refsource": "CONFIRM", "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=65501" }, { "name": "[MediaWiki-announce] 20140529 MediaWiki Security and Maintenance Releases: 1.19.16, 1.21.10 and 1.22.7", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-May/000151.html" }, { "name": "DSA-2957", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-2957" }, { "name": "67787", "refsource": "BID", "url": "http://www.securityfocus.com/bid/67787" }, { "name": "58834", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58834" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-3966", "datePublished": "2014-06-06T14:00:00", "dateReserved": "2014-06-04T00:00:00", "dateUpdated": "2024-08-06T10:57:18.054Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-4569
Vulnerability from cvelistv5
Published
2013-12-13 18:00
Modified
2024-08-06 16:45
Severity ?
EPSS score ?
Summary
The CleanChanges extension for MediaWiki before 1.19.9, 1.20.x before 1.20.8, and 1.21.x before 1.21.3, when "Group changes by page in recent changes and watchlist" is enabled, allows remote attackers to obtain sensitive information (revision-deleted IPs) via the Recent Changes page.
References
▼ | URL | Tags |
---|---|---|
http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-November/000135.html | mailing-list, x_refsource_MLIST | |
http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123011.html | vendor-advisory, x_refsource_FEDORA | |
http://lists.fedoraproject.org/pipermail/package-announce/2013-December/122998.html | vendor-advisory, x_refsource_FEDORA | |
https://bugzilla.wikimedia.org/show_bug.cgi?id=54294 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:45:14.859Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[MediaWiki-announce] 20131114 MediaWiki Security Release: 1.21.3, 1.20.8 and 1.19.9", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-November/000135.html" }, { "name": "FEDORA-2013-21856", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123011.html" }, { "name": "FEDORA-2013-21874", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/122998.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=54294" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-09-18T00:00:00", "descriptions": [ { "lang": "en", "value": "The CleanChanges extension for MediaWiki before 1.19.9, 1.20.x before 1.20.8, and 1.21.x before 1.21.3, when \"Group changes by page in recent changes and watchlist\" is enabled, allows remote attackers to obtain sensitive information (revision-deleted IPs) via the Recent Changes page." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-12-13T17:57:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[MediaWiki-announce] 20131114 MediaWiki Security Release: 1.21.3, 1.20.8 and 1.19.9", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-November/000135.html" }, { "name": "FEDORA-2013-21856", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123011.html" }, { "name": "FEDORA-2013-21874", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/122998.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=54294" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4569", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The CleanChanges extension for MediaWiki before 1.19.9, 1.20.x before 1.20.8, and 1.21.x before 1.21.3, when \"Group changes by page in recent changes and watchlist\" is enabled, allows remote attackers to obtain sensitive information (revision-deleted IPs) via the Recent Changes page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[MediaWiki-announce] 20131114 MediaWiki Security Release: 1.21.3, 1.20.8 and 1.19.9", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-November/000135.html" }, { "name": "FEDORA-2013-21856", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123011.html" }, { "name": "FEDORA-2013-21874", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/122998.html" }, { "name": "https://bugzilla.wikimedia.org/show_bug.cgi?id=54294", "refsource": "CONFIRM", "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=54294" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-4569", "datePublished": "2013-12-13T18:00:00", "dateReserved": "2013-06-12T00:00:00", "dateUpdated": "2024-08-06T16:45:14.859Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-5252
Vulnerability from cvelistv5
Published
2008-12-19 17:00
Modified
2024-08-07 10:49
Severity ?
EPSS score ?
Summary
Cross-site request forgery (CSRF) vulnerability in the Special:Import feature in MediaWiki 1.3.0 through 1.6.10, 1.12.x before 1.12.2, and 1.13.x before 1.13.3 allows remote attackers to perform unspecified actions as authenticated users via unknown vectors.
References
▼ | URL | Tags |
---|---|---|
https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01309.html | vendor-advisory, x_refsource_FEDORA | |
http://www.debian.org/security/2009/dsa-1901 | vendor-advisory, x_refsource_DEBIAN | |
http://secunia.com/advisories/33133 | third-party-advisory, x_refsource_SECUNIA | |
http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html | vendor-advisory, x_refsource_SUSE | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2008-December/000080.html | mailing-list, x_refsource_MLIST | |
https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01256.html | vendor-advisory, x_refsource_FEDORA | |
http://secunia.com/advisories/33349 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T10:49:11.991Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "FEDORA-2008-11802", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01309.html" }, { "name": "DSA-1901", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2009/dsa-1901" }, { "name": "33133", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33133" }, { "name": "SUSE-SR:2009:004", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html" }, { "name": "[mediawiki-announce] 20081215 MediaWiki 1.13.3, 1.12.2, 1.6.11 security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2008-December/000080.html" }, { "name": "FEDORA-2008-11688", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01256.html" }, { "name": "33349", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33349" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-12-15T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability in the Special:Import feature in MediaWiki 1.3.0 through 1.6.10, 1.12.x before 1.12.2, and 1.13.x before 1.13.3 allows remote attackers to perform unspecified actions as authenticated users via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-02-18T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "FEDORA-2008-11802", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01309.html" }, { "name": "DSA-1901", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2009/dsa-1901" }, { "name": "33133", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33133" }, { "name": "SUSE-SR:2009:004", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html" }, { "name": "[mediawiki-announce] 20081215 MediaWiki 1.13.3, 1.12.2, 1.6.11 security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2008-December/000080.html" }, { "name": "FEDORA-2008-11688", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01256.html" }, { "name": "33349", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33349" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-5252", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site request forgery (CSRF) vulnerability in the Special:Import feature in MediaWiki 1.3.0 through 1.6.10, 1.12.x before 1.12.2, and 1.13.x before 1.13.3 allows remote attackers to perform unspecified actions as authenticated users via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "FEDORA-2008-11802", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01309.html" }, { "name": "DSA-1901", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2009/dsa-1901" }, { "name": "33133", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33133" }, { "name": "SUSE-SR:2009:004", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html" }, { "name": "[mediawiki-announce] 20081215 MediaWiki 1.13.3, 1.12.2, 1.6.11 security update", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2008-December/000080.html" }, { "name": "FEDORA-2008-11688", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01256.html" }, { "name": "33349", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33349" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-5252", "datePublished": "2008-12-19T17:00:00", "dateReserved": "2008-11-26T00:00:00", "dateUpdated": "2024-08-07T10:49:11.991Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-31547
Vulnerability from cvelistv5
Published
2021-04-22 02:30
Modified
2024-08-03 23:03
Severity ?
EPSS score ?
Summary
An issue was discovered in the AbuseFilter extension for MediaWiki through 1.35.2. Its AbuseFilterCheckMatch API reveals suppressed edits and usernames to unprivileged users through the iteration of crafted AbuseFilter rules.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T223654 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/I3f7dbd8b873d411e37c8c3aac2339bf5ec36907d | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/I4900b1be73323599d74e3164447f81eded094d75 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:03:33.474Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T223654" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/I3f7dbd8b873d411e37c8c3aac2339bf5ec36907d" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/I4900b1be73323599d74e3164447f81eded094d75" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the AbuseFilter extension for MediaWiki through 1.35.2. Its AbuseFilterCheckMatch API reveals suppressed edits and usernames to unprivileged users through the iteration of crafted AbuseFilter rules." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-22T02:30:35", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T223654" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/I3f7dbd8b873d411e37c8c3aac2339bf5ec36907d" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/I4900b1be73323599d74e3164447f81eded094d75" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-31547", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in the AbuseFilter extension for MediaWiki through 1.35.2. Its AbuseFilterCheckMatch API reveals suppressed edits and usernames to unprivileged users through the iteration of crafted AbuseFilter rules." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T223654", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T223654" }, { "name": "https://gerrit.wikimedia.org/r/q/I3f7dbd8b873d411e37c8c3aac2339bf5ec36907d", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/I3f7dbd8b873d411e37c8c3aac2339bf5ec36907d" }, { "name": "https://gerrit.wikimedia.org/r/q/I4900b1be73323599d74e3164447f81eded094d75", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/I4900b1be73323599d74e3164447f81eded094d75" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-31547", "datePublished": "2021-04-22T02:30:35", "dateReserved": "2021-04-22T00:00:00", "dateUpdated": "2024-08-03T23:03:33.474Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-2611
Vulnerability from cvelistv5
Published
2006-05-26 01:00
Modified
2024-08-07 17:58
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in includes/Sanitizer.php in the variable handler in MediaWiki 1.6.x before r14349 allows remote attackers to inject arbitrary Javascript via unspecified vectors, possibly involving the usage of the | (pipe) character.
References
▼ | URL | Tags |
---|---|---|
http://www.osvdb.org/25713 | vdb-entry, x_refsource_OSVDB | |
http://nickj.org/MediaWiki | x_refsource_MISC | |
http://bugzilla.wikimedia.org/show_bug.cgi?id=6055 | x_refsource_MISC | |
http://mail.wikipedia.org/pipermail/wikitech-l/2006-May/035812.html | mailing-list, x_refsource_MLIST | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/26646 | vdb-entry, x_refsource_XF | |
http://svn.wikimedia.org/viewvc/mediawiki?view=rev&revision=14349 | x_refsource_CONFIRM | |
http://www.vupen.com/english/advisories/2006/1926 | vdb-entry, x_refsource_VUPEN | |
http://svn.wikimedia.org/viewvc/mediawiki/trunk/phase3/includes/Sanitizer.php?r1=14349&r2=14348&pathrev=14349 | x_refsource_MISC | |
http://mail.wikipedia.org/pipermail/wikitech-l/2006-May/035814.html | mailing-list, x_refsource_MLIST | |
http://secunia.com/advisories/20189 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T17:58:51.837Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "25713", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/25713" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://nickj.org/MediaWiki" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://bugzilla.wikimedia.org/show_bug.cgi?id=6055" }, { "name": "[Wikitech-l] 20060523 MediaWiki 1.6.5 JavaScript Execution Vulnerability # 2", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://mail.wikipedia.org/pipermail/wikitech-l/2006-May/035812.html" }, { "name": "mediawiki-unspecified-handler-xss(26646)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26646" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.wikimedia.org/viewvc/mediawiki?view=rev\u0026revision=14349" }, { "name": "ADV-2006-1926", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/1926" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://svn.wikimedia.org/viewvc/mediawiki/trunk/phase3/includes/Sanitizer.php?r1=14349\u0026r2=14348\u0026pathrev=14349" }, { "name": "[Wikitech-l] 20060523 MediaWiki 1.6.5 JavaScript Execution Vulnerability # 2", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://mail.wikipedia.org/pipermail/wikitech-l/2006-May/035814.html" }, { "name": "20189", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20189" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-05-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in includes/Sanitizer.php in the variable handler in MediaWiki 1.6.x before r14349 allows remote attackers to inject arbitrary Javascript via unspecified vectors, possibly involving the usage of the | (pipe) character." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "25713", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/25713" }, { "tags": [ "x_refsource_MISC" ], "url": "http://nickj.org/MediaWiki" }, { "tags": [ "x_refsource_MISC" ], "url": "http://bugzilla.wikimedia.org/show_bug.cgi?id=6055" }, { "name": "[Wikitech-l] 20060523 MediaWiki 1.6.5 JavaScript Execution Vulnerability # 2", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://mail.wikipedia.org/pipermail/wikitech-l/2006-May/035812.html" }, { "name": "mediawiki-unspecified-handler-xss(26646)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26646" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.wikimedia.org/viewvc/mediawiki?view=rev\u0026revision=14349" }, { "name": "ADV-2006-1926", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/1926" }, { "tags": [ "x_refsource_MISC" ], "url": "http://svn.wikimedia.org/viewvc/mediawiki/trunk/phase3/includes/Sanitizer.php?r1=14349\u0026r2=14348\u0026pathrev=14349" }, { "name": "[Wikitech-l] 20060523 MediaWiki 1.6.5 JavaScript Execution Vulnerability # 2", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://mail.wikipedia.org/pipermail/wikitech-l/2006-May/035814.html" }, { "name": "20189", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20189" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-2611", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in includes/Sanitizer.php in the variable handler in MediaWiki 1.6.x before r14349 allows remote attackers to inject arbitrary Javascript via unspecified vectors, possibly involving the usage of the | (pipe) character." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "25713", "refsource": "OSVDB", "url": "http://www.osvdb.org/25713" }, { "name": "http://nickj.org/MediaWiki", "refsource": "MISC", "url": "http://nickj.org/MediaWiki" }, { "name": "http://bugzilla.wikimedia.org/show_bug.cgi?id=6055", "refsource": "MISC", "url": "http://bugzilla.wikimedia.org/show_bug.cgi?id=6055" }, { "name": "[Wikitech-l] 20060523 MediaWiki 1.6.5 JavaScript Execution Vulnerability # 2", "refsource": "MLIST", "url": "http://mail.wikipedia.org/pipermail/wikitech-l/2006-May/035812.html" }, { "name": "mediawiki-unspecified-handler-xss(26646)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26646" }, { "name": "http://svn.wikimedia.org/viewvc/mediawiki?view=rev\u0026revision=14349", "refsource": "CONFIRM", "url": "http://svn.wikimedia.org/viewvc/mediawiki?view=rev\u0026revision=14349" }, { "name": "ADV-2006-1926", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/1926" }, { "name": "http://svn.wikimedia.org/viewvc/mediawiki/trunk/phase3/includes/Sanitizer.php?r1=14349\u0026r2=14348\u0026pathrev=14349", "refsource": "MISC", "url": "http://svn.wikimedia.org/viewvc/mediawiki/trunk/phase3/includes/Sanitizer.php?r1=14349\u0026r2=14348\u0026pathrev=14349" }, { "name": "[Wikitech-l] 20060523 MediaWiki 1.6.5 JavaScript Execution Vulnerability # 2", "refsource": "MLIST", "url": "http://mail.wikipedia.org/pipermail/wikitech-l/2006-May/035814.html" }, { "name": "20189", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20189" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-2611", "datePublished": "2006-05-26T01:00:00", "dateReserved": "2006-05-25T00:00:00", "dateUpdated": "2024-08-07T17:58:51.837Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-4306
Vulnerability from cvelistv5
Published
2013-10-11 21:00
Modified
2024-08-06 16:38
Severity ?
EPSS score ?
Summary
Cross-site request forgery (CSRF) vulnerability in api/ApiQueryCheckUser.php in the CheckUser extension for MediaWiki, possibly Checkuser before 2.3, allows remote attackers to hijack the authentication of arbitrary users for requests that "perform sensitive write actions" via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://seclists.org/oss-sec/2013/q3/553 | mailing-list, x_refsource_MLIST | |
https://git.wikimedia.org/commit/mediawiki%2Fextensions%2FCheckUser.git/99ad25d066ce6111e798427cba7f21526827f651 | x_refsource_CONFIRM | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-September/000133.html | mailing-list, x_refsource_MLIST | |
http://www.securityfocus.com/bid/62210 | vdb-entry, x_refsource_BID | |
http://osvdb.org/96908 | vdb-entry, x_refsource_OSVDB | |
https://bugzilla.wikimedia.org/show_bug.cgi?id=45019 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/86893 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:38:01.961Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20130904 Re: CVE request: MediaWiki Security Release: 1.21.2, 1.20.7 and 1.19.8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2013/q3/553" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://git.wikimedia.org/commit/mediawiki%2Fextensions%2FCheckUser.git/99ad25d066ce6111e798427cba7f21526827f651" }, { "name": "[MediaWiki-announce] 20130903 MediaWiki Security Release: 1.21.2, 1.20.7 and 1.19.8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-September/000133.html" }, { "name": "62210", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/62210" }, { "name": "96908", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/96908" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=45019" }, { "name": "mediawiki-cve20134306-csrf(86893)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86893" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-09-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability in api/ApiQueryCheckUser.php in the CheckUser extension for MediaWiki, possibly Checkuser before 2.3, allows remote attackers to hijack the authentication of arbitrary users for requests that \"perform sensitive write actions\" via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[oss-security] 20130904 Re: CVE request: MediaWiki Security Release: 1.21.2, 1.20.7 and 1.19.8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2013/q3/553" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://git.wikimedia.org/commit/mediawiki%2Fextensions%2FCheckUser.git/99ad25d066ce6111e798427cba7f21526827f651" }, { "name": "[MediaWiki-announce] 20130903 MediaWiki Security Release: 1.21.2, 1.20.7 and 1.19.8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-September/000133.html" }, { "name": "62210", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/62210" }, { "name": "96908", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/96908" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=45019" }, { "name": "mediawiki-cve20134306-csrf(86893)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86893" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4306", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site request forgery (CSRF) vulnerability in api/ApiQueryCheckUser.php in the CheckUser extension for MediaWiki, possibly Checkuser before 2.3, allows remote attackers to hijack the authentication of arbitrary users for requests that \"perform sensitive write actions\" via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20130904 Re: CVE request: MediaWiki Security Release: 1.21.2, 1.20.7 and 1.19.8", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2013/q3/553" }, { "name": "https://git.wikimedia.org/commit/mediawiki%2Fextensions%2FCheckUser.git/99ad25d066ce6111e798427cba7f21526827f651", "refsource": "CONFIRM", "url": "https://git.wikimedia.org/commit/mediawiki%2Fextensions%2FCheckUser.git/99ad25d066ce6111e798427cba7f21526827f651" }, { "name": "[MediaWiki-announce] 20130903 MediaWiki Security Release: 1.21.2, 1.20.7 and 1.19.8", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-September/000133.html" }, { "name": "62210", "refsource": "BID", "url": "http://www.securityfocus.com/bid/62210" }, { "name": "96908", "refsource": "OSVDB", "url": "http://osvdb.org/96908" }, { "name": "https://bugzilla.wikimedia.org/show_bug.cgi?id=45019", "refsource": "CONFIRM", "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=45019" }, { "name": "mediawiki-cve20134306-csrf(86893)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86893" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-4306", "datePublished": "2013-10-11T21:00:00", "dateReserved": "2013-06-12T00:00:00", "dateUpdated": "2024-08-06T16:38:01.961Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-44855
Vulnerability from cvelistv5
Published
2022-12-26 00:00
Modified
2024-08-04 04:32
Severity ?
EPSS score ?
Summary
An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. There is Blind Stored XSS via a URL to the Upload Image feature.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:32:13.127Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T293589" }, { "tags": [ "x_transferred" ], "url": "https://security.gentoo.org/glsa/202305-24" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "unknown", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. There is Blind Stored XSS via a URL to the Upload Image feature." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-26T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T293589" }, { "url": "https://security.gentoo.org/glsa/202305-24" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-44855", "datePublished": "2022-12-26T00:00:00", "dateReserved": "2021-12-13T00:00:00", "dateUpdated": "2024-08-04T04:32:13.127Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-4382
Vulnerability from cvelistv5
Published
2017-10-19 21:00
Modified
2024-08-06 20:35
Severity ?
EPSS score ?
Summary
MediaWiki before 1.18.5, and 1.19.x before 1.19.2 does not properly protect user block metadata, which allows remote administrators to read a user block reason via a reblock attempt.
References
▼ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2012/08/31/6 | mailing-list, x_refsource_MLIST | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2012-August/000119.html | mailing-list, x_refsource_MLIST | |
https://phabricator.wikimedia.org/T41823 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2012/08/31/10 | mailing-list, x_refsource_MLIST | |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:35:08.977Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20120831 CVE Request -- MediaWiki 1.19.2 and 1.18.5 multiple security flaws", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/08/31/6" }, { "name": "[MediaWiki-announce] 20120831 MediaWiki security release: 1.19.2 and 1.18.5", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2012-August/000119.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T41823" }, { "name": "[oss-security] 20120831 Re: CVE Request -- MediaWiki 1.19.2 and 1.18.5 multiple security flaws", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/08/31/10" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-08-31T00:00:00", "descriptions": [ { "lang": "en", "value": "MediaWiki before 1.18.5, and 1.19.x before 1.19.2 does not properly protect user block metadata, which allows remote administrators to read a user block reason via a reblock attempt." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-19T20:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[oss-security] 20120831 CVE Request -- MediaWiki 1.19.2 and 1.18.5 multiple security flaws", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/08/31/6" }, { "name": "[MediaWiki-announce] 20120831 MediaWiki security release: 1.19.2 and 1.18.5", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2012-August/000119.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T41823" }, { "name": "[oss-security] 20120831 Re: CVE Request -- MediaWiki 1.19.2 and 1.18.5 multiple security flaws", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/08/31/10" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-4382", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MediaWiki before 1.18.5, and 1.19.x before 1.19.2 does not properly protect user block metadata, which allows remote administrators to read a user block reason via a reblock attempt." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20120831 CVE Request -- MediaWiki 1.19.2 and 1.18.5 multiple security flaws", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2012/08/31/6" }, { "name": "[MediaWiki-announce] 20120831 MediaWiki security release: 1.19.2 and 1.18.5", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2012-August/000119.html" }, { "name": "https://phabricator.wikimedia.org/T41823", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T41823" }, { "name": "[oss-security] 20120831 Re: CVE Request -- MediaWiki 1.19.2 and 1.18.5 multiple security flaws", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2012/08/31/10" }, { "name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330", "refsource": "MISC", "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-4382", "datePublished": "2017-10-19T21:00:00", "dateReserved": "2012-08-21T00:00:00", "dateUpdated": "2024-08-06T20:35:08.977Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-0367
Vulnerability from cvelistv5
Published
2018-04-13 16:00
Modified
2024-09-17 00:01
Severity ?
EPSS score ?
Summary
Mediawiki before 1.28.1 / 1.27.2 contains an unsafe use of temporary directory, where having LocalisationCache directory default to system tmp directory is insecure.
References
▼ | URL | Tags |
---|---|---|
https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html | mailing-list, x_refsource_MLIST | |
https://phabricator.wikimedia.org/T161453 | x_refsource_CONFIRM | |
https://security-tracker.debian.org/tracker/CVE-2017-0367 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T13:03:57.030Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[mediawiki-announce] 20170406 Security Release: 1.28.1 / 1.27.2 / 1.23.16", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T161453" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security-tracker.debian.org/tracker/CVE-2017-0367" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "mediawiki", "vendor": "mediawiki", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-04-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Mediawiki before 1.28.1 / 1.27.2 contains an unsafe use of temporary directory, where having LocalisationCache directory default to system tmp directory is insecure." } ], "problemTypes": [ { "descriptions": [ { "description": "usafe use of system tmp directory.", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-04-13T15:57:01", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "name": "[mediawiki-announce] 20170406 Security Release: 1.28.1 / 1.27.2 / 1.23.16", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T161453" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security-tracker.debian.org/tracker/CVE-2017-0367" } ], "source": { "advisory": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html", "discovery": "UNKNOWN" }, "title": "Having LocalisationCache directory default to system tmp directory is insecure", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "DATE_PUBLIC": "2017-04-06T20:49:00.000Z", "ID": "CVE-2017-0367", "STATE": "PUBLIC", "TITLE": "Having LocalisationCache directory default to system tmp directory is insecure" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "mediawiki", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "mediawiki" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Mediawiki before 1.28.1 / 1.27.2 contains an unsafe use of temporary directory, where having LocalisationCache directory default to system tmp directory is insecure." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "usafe use of system tmp directory." } ] } ] }, "references": { "reference_data": [ { "name": "[mediawiki-announce] 20170406 Security Release: 1.28.1 / 1.27.2 / 1.23.16", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html" }, { "name": "https://phabricator.wikimedia.org/T161453", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T161453" }, { "name": "https://security-tracker.debian.org/tracker/CVE-2017-0367", "refsource": "CONFIRM", "url": "https://security-tracker.debian.org/tracker/CVE-2017-0367" } ] }, "source": { "advisory": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2017-0367", "datePublished": "2018-04-13T16:00:00Z", "dateReserved": "2016-11-29T00:00:00", "dateUpdated": "2024-09-17T00:01:46.702Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-44856
Vulnerability from cvelistv5
Published
2022-12-26 00:00
Modified
2024-08-04 04:32
Severity ?
EPSS score ?
Summary
An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. A title blocked by AbuseFilter can be created via Special:ChangeContentModel due to the mishandling of the EditFilterMergedContent hook return value.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:32:13.284Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T271037" }, { "tags": [ "x_transferred" ], "url": "https://security.gentoo.org/glsa/202305-24" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "unknown", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. A title blocked by AbuseFilter can be created via Special:ChangeContentModel due to the mishandling of the EditFilterMergedContent hook return value." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-26T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T271037" }, { "url": "https://security.gentoo.org/glsa/202305-24" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-44856", "datePublished": "2022-12-26T00:00:00", "dateReserved": "2021-12-13T00:00:00", "dateUpdated": "2024-08-04T04:32:13.284Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-7199
Vulnerability from cvelistv5
Published
2014-09-30 14:00
Modified
2024-08-06 12:40
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in MediaWiki before 1.19.19, 1.22.x before 1.22.11, and 1.23.x before 1.23.4 allows remote attackers to inject arbitrary web script or HTML via a crafted SVG file.
References
▼ | URL | Tags |
---|---|---|
https://gerrit.wikimedia.org/r/#/c/162777/ | x_refsource_CONFIRM | |
http://www.debian.org/security/2014/dsa-3036 | vendor-advisory, x_refsource_DEBIAN | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-September/000161.html | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2014/09/27/2 | mailing-list, x_refsource_MLIST | |
http://secunia.com/advisories/61666 | third-party-advisory, x_refsource_SECUNIA | |
https://bugzilla.wikimedia.org/show_bug.cgi?id=69008 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T12:40:19.157Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/#/c/162777/" }, { "name": "DSA-3036", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-3036" }, { "name": "[MediaWiki-announce] 20140924 MediaWiki Security and Maintenance Releases: 1.19.19, 1.22.11 and 1.23.4", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-September/000161.html" }, { "name": "[oss-security] 20140927 Re: CVE request: Mediawiki before 1.19.19, 1.22.11 and 1.23.4 insufficient CSS filtering of SVGs", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/09/27/2" }, { "name": "61666", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61666" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=69008" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-08-01T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in MediaWiki before 1.19.19, 1.22.x before 1.22.11, and 1.23.x before 1.23.4 allows remote attackers to inject arbitrary web script or HTML via a crafted SVG file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-10-03T13:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://gerrit.wikimedia.org/r/#/c/162777/" }, { "name": "DSA-3036", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-3036" }, { "name": "[MediaWiki-announce] 20140924 MediaWiki Security and Maintenance Releases: 1.19.19, 1.22.11 and 1.23.4", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-September/000161.html" }, { "name": "[oss-security] 20140927 Re: CVE request: Mediawiki before 1.19.19, 1.22.11 and 1.23.4 insufficient CSS filtering of SVGs", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/09/27/2" }, { "name": "61666", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61666" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=69008" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-7199", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in MediaWiki before 1.19.19, 1.22.x before 1.22.11, and 1.23.x before 1.23.4 allows remote attackers to inject arbitrary web script or HTML via a crafted SVG file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://gerrit.wikimedia.org/r/#/c/162777/", "refsource": "CONFIRM", "url": "https://gerrit.wikimedia.org/r/#/c/162777/" }, { "name": "DSA-3036", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-3036" }, { "name": "[MediaWiki-announce] 20140924 MediaWiki Security and Maintenance Releases: 1.19.19, 1.22.11 and 1.23.4", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-September/000161.html" }, { "name": "[oss-security] 20140927 Re: CVE request: Mediawiki before 1.19.19, 1.22.11 and 1.23.4 insufficient CSS filtering of SVGs", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/09/27/2" }, { "name": "61666", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61666" }, { "name": "https://bugzilla.wikimedia.org/show_bug.cgi?id=69008", "refsource": "CONFIRM", "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=69008" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-7199", "datePublished": "2014-09-30T14:00:00", "dateReserved": "2014-09-26T00:00:00", "dateUpdated": "2024-08-06T12:40:19.157Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-5241
Vulnerability from cvelistv5
Published
2014-08-22 17:00
Modified
2024-08-06 11:41
Severity ?
EPSS score ?
Summary
The JSONP endpoint in includes/api/ApiFormatJson.php in MediaWiki before 1.19.18, 1.20.x through 1.22.x before 1.22.9, and 1.23.x before 1.23.2 accepts certain long callback values and does not restrict the initial bytes of a JSONP response, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks, and obtain sensitive information, via a crafted OBJECT element with SWF content consistent with a restricted character set.
References
▼ | URL | Tags |
---|---|---|
https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-July/000157.html | mailing-list, x_refsource_MLIST | |
http://www.debian.org/security/2014/dsa-3011 | vendor-advisory, x_refsource_DEBIAN | |
http://www.mandriva.com/security/advisories?name=MDVSA-2014:153 | vendor-advisory, x_refsource_MANDRIVA | |
http://secunia.com/advisories/59738 | third-party-advisory, x_refsource_SECUNIA | |
https://bugzilla.wikimedia.org/show_bug.cgi?id=68187 | x_refsource_CONFIRM | |
http://openwall.com/lists/oss-security/2014/08/14/5 | mailing-list, x_refsource_MLIST | |
http://advisories.mageia.org/MGASA-2014-0309.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T11:41:47.649Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[MediaWiki-announce] 20140730 MediaWiki Security and Maintenance Releases: 1.19.18, 1.22.9 and 1.23.2", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-July/000157.html" }, { "name": "DSA-3011", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-3011" }, { "name": "MDVSA-2014:153", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:153" }, { "name": "59738", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59738" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=68187" }, { "name": "[oss-security] 20140814 Re: Possible CVE Request: MediaWiki Security and Maintenance Releases: 1.19.18, 1.22.9 and 1.23.2", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2014/08/14/5" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://advisories.mageia.org/MGASA-2014-0309.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-08-01T00:00:00", "descriptions": [ { "lang": "en", "value": "The JSONP endpoint in includes/api/ApiFormatJson.php in MediaWiki before 1.19.18, 1.20.x through 1.22.x before 1.22.9, and 1.23.x before 1.23.2 accepts certain long callback values and does not restrict the initial bytes of a JSONP response, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks, and obtain sensitive information, via a crafted OBJECT element with SWF content consistent with a restricted character set." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-01-04T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[MediaWiki-announce] 20140730 MediaWiki Security and Maintenance Releases: 1.19.18, 1.22.9 and 1.23.2", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-July/000157.html" }, { "name": "DSA-3011", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-3011" }, { "name": "MDVSA-2014:153", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:153" }, { "name": "59738", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59738" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=68187" }, { "name": "[oss-security] 20140814 Re: Possible CVE Request: MediaWiki Security and Maintenance Releases: 1.19.18, 1.22.9 and 1.23.2", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2014/08/14/5" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://advisories.mageia.org/MGASA-2014-0309.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-5241", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The JSONP endpoint in includes/api/ApiFormatJson.php in MediaWiki before 1.19.18, 1.20.x through 1.22.x before 1.22.9, and 1.23.x before 1.23.2 accepts certain long callback values and does not restrict the initial bytes of a JSONP response, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks, and obtain sensitive information, via a crafted OBJECT element with SWF content consistent with a restricted character set." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[MediaWiki-announce] 20140730 MediaWiki Security and Maintenance Releases: 1.19.18, 1.22.9 and 1.23.2", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-July/000157.html" }, { "name": "DSA-3011", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-3011" }, { "name": "MDVSA-2014:153", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:153" }, { "name": "59738", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59738" }, { "name": "https://bugzilla.wikimedia.org/show_bug.cgi?id=68187", "refsource": "CONFIRM", "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=68187" }, { "name": "[oss-security] 20140814 Re: Possible CVE Request: MediaWiki Security and Maintenance Releases: 1.19.18, 1.22.9 and 1.23.2", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2014/08/14/5" }, { "name": "http://advisories.mageia.org/MGASA-2014-0309.html", "refsource": "CONFIRM", "url": "http://advisories.mageia.org/MGASA-2014-0309.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-5241", "datePublished": "2014-08-22T17:00:00", "dateReserved": "2014-08-14T00:00:00", "dateUpdated": "2024-08-06T11:41:47.649Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-5688
Vulnerability from cvelistv5
Published
2008-12-19 17:00
Modified
2024-08-07 11:04
Severity ?
EPSS score ?
Summary
MediaWiki 1.8.1, and other versions before 1.13.3, when the wgShowExceptionDetails variable is enabled, sometimes provides the full installation path in a debugging message, which might allow remote attackers to obtain sensitive information via unspecified requests that trigger an uncaught exception.
References
▼ | URL | Tags |
---|---|---|
https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01309.html | vendor-advisory, x_refsource_FEDORA | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2008-December/000080.html | mailing-list, x_refsource_MLIST | |
http://www.mediawiki.org/wiki/Manual:%24wgShowExceptionDetails | x_refsource_MISC | |
https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01256.html | vendor-advisory, x_refsource_FEDORA | |
http://secunia.com/advisories/33349 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T11:04:44.557Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "FEDORA-2008-11802", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01309.html" }, { "name": "[mediawiki-announce] 20081215 MediaWiki 1.13.3, 1.12.2, 1.6.11 security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2008-December/000080.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.mediawiki.org/wiki/Manual:%24wgShowExceptionDetails" }, { "name": "FEDORA-2008-11688", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01256.html" }, { "name": "33349", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33349" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-12-15T00:00:00", "descriptions": [ { "lang": "en", "value": "MediaWiki 1.8.1, and other versions before 1.13.3, when the wgShowExceptionDetails variable is enabled, sometimes provides the full installation path in a debugging message, which might allow remote attackers to obtain sensitive information via unspecified requests that trigger an uncaught exception." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-01-09T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "FEDORA-2008-11802", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01309.html" }, { "name": "[mediawiki-announce] 20081215 MediaWiki 1.13.3, 1.12.2, 1.6.11 security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2008-December/000080.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.mediawiki.org/wiki/Manual:%24wgShowExceptionDetails" }, { "name": "FEDORA-2008-11688", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01256.html" }, { "name": "33349", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33349" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-5688", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MediaWiki 1.8.1, and other versions before 1.13.3, when the wgShowExceptionDetails variable is enabled, sometimes provides the full installation path in a debugging message, which might allow remote attackers to obtain sensitive information via unspecified requests that trigger an uncaught exception." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "FEDORA-2008-11802", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01309.html" }, { "name": "[mediawiki-announce] 20081215 MediaWiki 1.13.3, 1.12.2, 1.6.11 security update", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2008-December/000080.html" }, { "name": "http://www.mediawiki.org/wiki/Manual:$wgShowExceptionDetails", "refsource": "MISC", "url": "http://www.mediawiki.org/wiki/Manual:$wgShowExceptionDetails" }, { "name": "FEDORA-2008-11688", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01256.html" }, { "name": "33349", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33349" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-5688", "datePublished": "2008-12-19T17:00:00", "dateReserved": "2008-12-19T00:00:00", "dateUpdated": "2024-08-07T11:04:44.557Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-8623
Vulnerability from cvelistv5
Published
2017-03-23 20:00
Modified
2024-08-06 08:20
Severity ?
EPSS score ?
Summary
The User::matchEditToken function in includes/User.php in MediaWiki before 1.23.12 and 1.24.x before 1.24.5 does not perform token comparison in constant time before returning, which allows remote attackers to guess the edit token and bypass CSRF protection via a timing attack, a different vulnerability than CVE-2015-8624.
References
▼ | URL | Tags |
---|---|---|
https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-December/000186.html | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2015/12/23/7 | mailing-list, x_refsource_MLIST | |
https://phabricator.wikimedia.org/T119309 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2015/12/21/8 | mailing-list, x_refsource_MLIST | |
https://gerrit.wikimedia.org/r/#/c/156336/5/includes/User.php | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:20:43.473Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[MediaWiki-announce] 20151221 [MediaWiki-announce] Security Release: 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-December/000186.html" }, { "name": "[oss-security] 20151223 Re: CVE requests for MediaWiki 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/12/23/7" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T119309" }, { "name": "[oss-security] 20151221 CVE requests for MediaWiki 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/12/21/8" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/#/c/156336/5/includes/User.php" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-12-21T00:00:00", "descriptions": [ { "lang": "en", "value": "The User::matchEditToken function in includes/User.php in MediaWiki before 1.23.12 and 1.24.x before 1.24.5 does not perform token comparison in constant time before returning, which allows remote attackers to guess the edit token and bypass CSRF protection via a timing attack, a different vulnerability than CVE-2015-8624." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-03-23T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[MediaWiki-announce] 20151221 [MediaWiki-announce] Security Release: 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-December/000186.html" }, { "name": "[oss-security] 20151223 Re: CVE requests for MediaWiki 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/12/23/7" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T119309" }, { "name": "[oss-security] 20151221 CVE requests for MediaWiki 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/12/21/8" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://gerrit.wikimedia.org/r/#/c/156336/5/includes/User.php" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-8623", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The User::matchEditToken function in includes/User.php in MediaWiki before 1.23.12 and 1.24.x before 1.24.5 does not perform token comparison in constant time before returning, which allows remote attackers to guess the edit token and bypass CSRF protection via a timing attack, a different vulnerability than CVE-2015-8624." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[MediaWiki-announce] 20151221 [MediaWiki-announce] Security Release: 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-December/000186.html" }, { "name": "[oss-security] 20151223 Re: CVE requests for MediaWiki 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/12/23/7" }, { "name": "https://phabricator.wikimedia.org/T119309", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T119309" }, { "name": "[oss-security] 20151221 CVE requests for MediaWiki 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/12/21/8" }, { "name": "https://gerrit.wikimedia.org/r/#/c/156336/5/includes/User.php", "refsource": "CONFIRM", "url": "https://gerrit.wikimedia.org/r/#/c/156336/5/includes/User.php" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-8623", "datePublished": "2017-03-23T20:00:00", "dateReserved": "2015-12-23T00:00:00", "dateUpdated": "2024-08-06T08:20:43.473Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-25815
Vulnerability from cvelistv5
Published
2020-09-27 20:27
Modified
2024-08-04 15:40
Severity ?
EPSS score ?
Summary
An issue was discovered in MediaWiki 1.32.x through 1.34.x before 1.34.4. LogEventList::getFiltersDesc is insecurely using message text to build options names for an HTML multi-select field. The relevant code should use escaped() instead of text().
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:40:36.957Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/g/mediawiki/core/+/ec76e14be658187544f07c1a249a047e1a75eaf8/includes/logging/LogEventsList.php#214" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html" }, { "name": "FEDORA-2020-a4802c53d9", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RTTPZ7XMDS66I442OLLHXBDNP2LCBJU6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MediaWiki 1.32.x through 1.34.x before 1.34.4. LogEventList::getFiltersDesc is insecurely using message text to build options names for an HTML multi-select field. The relevant code should use escaped() instead of text()." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-14T02:06:10", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/g/mediawiki/core/+/ec76e14be658187544f07c1a249a047e1a75eaf8/includes/logging/LogEventsList.php#214" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html" }, { "name": "FEDORA-2020-a4802c53d9", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RTTPZ7XMDS66I442OLLHXBDNP2LCBJU6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-25815", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in MediaWiki 1.32.x through 1.34.x before 1.34.4. LogEventList::getFiltersDesc is insecurely using message text to build options names for an HTML multi-select field. The relevant code should use escaped() instead of text()." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://gerrit.wikimedia.org/g/mediawiki/core/+/ec76e14be658187544f07c1a249a047e1a75eaf8/includes/logging/LogEventsList.php#214", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/g/mediawiki/core/+/ec76e14be658187544f07c1a249a047e1a75eaf8/includes/logging/LogEventsList.php#214" }, { "name": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html", "refsource": "CONFIRM", "url": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html" }, { "name": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html", "refsource": "MISC", "url": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html" }, { "name": "FEDORA-2020-a4802c53d9", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RTTPZ7XMDS66I442OLLHXBDNP2LCBJU6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-25815", "datePublished": "2020-09-27T20:27:14", "dateReserved": "2020-09-23T00:00:00", "dateUpdated": "2024-08-04T15:40:36.957Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-26120
Vulnerability from cvelistv5
Published
2020-09-27 20:07
Modified
2024-08-04 15:49
Severity ?
EPSS score ?
Summary
XSS exists in the MobileFrontend extension for MediaWiki before 1.34.4 because section.line is mishandled during regex section line replacement from PageGateway. Using crafted HTML, an attacker can elicit an XSS attack via jQuery's parseHTML method, which can cause image callbacks to fire even without the element being appended to the DOM.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T262213 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/I42e079bc875d17b336ab015f3678eaedc26e10ea | x_refsource_MISC | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RTTPZ7XMDS66I442OLLHXBDNP2LCBJU6/ | vendor-advisory, x_refsource_FEDORA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:49:07.061Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T262213" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/I42e079bc875d17b336ab015f3678eaedc26e10ea" }, { "name": "FEDORA-2020-a4802c53d9", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RTTPZ7XMDS66I442OLLHXBDNP2LCBJU6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "XSS exists in the MobileFrontend extension for MediaWiki before 1.34.4 because section.line is mishandled during regex section line replacement from PageGateway. Using crafted HTML, an attacker can elicit an XSS attack via jQuery\u0027s parseHTML method, which can cause image callbacks to fire even without the element being appended to the DOM." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-14T02:06:12", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T262213" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/I42e079bc875d17b336ab015f3678eaedc26e10ea" }, { "name": "FEDORA-2020-a4802c53d9", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RTTPZ7XMDS66I442OLLHXBDNP2LCBJU6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-26120", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "XSS exists in the MobileFrontend extension for MediaWiki before 1.34.4 because section.line is mishandled during regex section line replacement from PageGateway. Using crafted HTML, an attacker can elicit an XSS attack via jQuery\u0027s parseHTML method, which can cause image callbacks to fire even without the element being appended to the DOM." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T262213", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T262213" }, { "name": "https://gerrit.wikimedia.org/r/q/I42e079bc875d17b336ab015f3678eaedc26e10ea", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/I42e079bc875d17b336ab015f3678eaedc26e10ea" }, { "name": "FEDORA-2020-a4802c53d9", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RTTPZ7XMDS66I442OLLHXBDNP2LCBJU6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-26120", "datePublished": "2020-09-27T20:07:52", "dateReserved": "2020-09-27T00:00:00", "dateUpdated": "2024-08-04T15:49:07.061Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-2031
Vulnerability from cvelistv5
Published
2013-11-15 18:16
Modified
2024-08-06 15:20
Severity ?
EPSS score ?
Summary
MediaWiki before 1.19.6 and 1.20.x before 1.20.5 allows remote attackers to conduct cross-site scripting (XSS) attacks, as demonstrated by a CDATA section containing valid UTF-7 encoded sequences in a SVG file, which is then incorrectly interpreted as UTF-8 by Chrome and Firefox.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:20:37.509Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "FEDORA-2013-7714", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105825.html" }, { "name": "57472", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/57472" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=47304" }, { "name": "55433", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/55433" }, { "name": "DSA-2891", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-2891" }, { "name": "FEDORA-2013-7654", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106293.html" }, { "name": "FEDORA-2013-7701", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105784.html" }, { "name": "59594", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/59594" }, { "name": "GLSA-201310-21", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201310-21.xml" }, { "name": "[MediaWiki-announce] 20130430 MediaWiki Security Release: 1.20.5 and 1.19.6", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-April/000129.html" }, { "name": "[oss-security] 20130501 Re: Mediawiki CVE request ( was Fw: [MediaWiki-announce] MediaWiki Security Release: 1.20.5 and 1.19.6)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2013/05/01/2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-04-17T00:00:00", "descriptions": [ { "lang": "en", "value": "MediaWiki before 1.19.6 and 1.20.x before 1.20.5 allows remote attackers to conduct cross-site scripting (XSS) attacks, as demonstrated by a CDATA section containing valid UTF-7 encoded sequences in a SVG file, which is then incorrectly interpreted as UTF-8 by Chrome and Firefox." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-29T18:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "FEDORA-2013-7714", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105825.html" }, { "name": "57472", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/57472" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=47304" }, { "name": "55433", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/55433" }, { "name": "DSA-2891", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-2891" }, { "name": "FEDORA-2013-7654", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106293.html" }, { "name": "FEDORA-2013-7701", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105784.html" }, { "name": "59594", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/59594" }, { "name": "GLSA-201310-21", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201310-21.xml" }, { "name": "[MediaWiki-announce] 20130430 MediaWiki Security Release: 1.20.5 and 1.19.6", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-April/000129.html" }, { "name": "[oss-security] 20130501 Re: Mediawiki CVE request ( was Fw: [MediaWiki-announce] MediaWiki Security Release: 1.20.5 and 1.19.6)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2013/05/01/2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-2031", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MediaWiki before 1.19.6 and 1.20.x before 1.20.5 allows remote attackers to conduct cross-site scripting (XSS) attacks, as demonstrated by a CDATA section containing valid UTF-7 encoded sequences in a SVG file, which is then incorrectly interpreted as UTF-8 by Chrome and Firefox." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "FEDORA-2013-7714", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105825.html" }, { "name": "57472", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/57472" }, { "name": "https://bugzilla.wikimedia.org/show_bug.cgi?id=47304", "refsource": "CONFIRM", "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=47304" }, { "name": "55433", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/55433" }, { "name": "DSA-2891", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-2891" }, { "name": "FEDORA-2013-7654", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106293.html" }, { "name": "FEDORA-2013-7701", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105784.html" }, { "name": "59594", "refsource": "BID", "url": "http://www.securityfocus.com/bid/59594" }, { "name": "GLSA-201310-21", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201310-21.xml" }, { "name": "[MediaWiki-announce] 20130430 MediaWiki Security Release: 1.20.5 and 1.19.6", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-April/000129.html" }, { "name": "[oss-security] 20130501 Re: Mediawiki CVE request ( was Fw: [MediaWiki-announce] MediaWiki Security Release: 1.20.5 and 1.19.6)", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2013/05/01/2" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-2031", "datePublished": "2013-11-15T18:16:00", "dateReserved": "2013-02-19T00:00:00", "dateUpdated": "2024-08-06T15:20:37.509Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-1580
Vulnerability from cvelistv5
Published
2012-09-09 21:00
Modified
2024-08-06 19:01
Severity ?
EPSS score ?
Summary
Cross-site request forgery (CSRF) vulnerability in Special:Upload in MediaWiki 1.17.x before 1.17.3 and 1.18.x before 1.18.2 allows remote attackers to hijack the authentication of unspecified victims for requests that upload files.
References
▼ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2012/03/24/1 | mailing-list, x_refsource_MLIST | |
http://osvdb.org/80364 | vdb-entry, x_refsource_OSVDB | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000110.html | mailing-list, x_refsource_MLIST | |
https://bugzilla.wikimedia.org/show_bug.cgi?id=35317 | x_refsource_CONFIRM | |
http://secunia.com/advisories/48504 | third-party-advisory, x_refsource_SECUNIA | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000109.html | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2012/03/22/9 | mailing-list, x_refsource_MLIST | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/74286 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/52689 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:01:02.473Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20120323 CVEs for MediaWiki security and maintenance release 1.18.2", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/03/24/1" }, { "name": "80364", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/80364" }, { "name": "[MediaWiki-announce] 20120322 MediaWiki security and maintenance release 1.18.2", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000110.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=35317" }, { "name": "48504", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48504" }, { "name": "[MediaWiki-announce] 20120322 MediaWiki security and maintenance release 1.17.3", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000109.html" }, { "name": "[oss-security] 20120322 MediaWiki security and maintenance release 1.18.2", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/03/22/9" }, { "name": "mediawiki-specialupload-csrf(74286)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74286" }, { "name": "52689", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/52689" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-03-22T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability in Special:Upload in MediaWiki 1.17.x before 1.17.3 and 1.18.x before 1.18.2 allows remote attackers to hijack the authentication of unspecified victims for requests that upload files." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[oss-security] 20120323 CVEs for MediaWiki security and maintenance release 1.18.2", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/03/24/1" }, { "name": "80364", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/80364" }, { "name": "[MediaWiki-announce] 20120322 MediaWiki security and maintenance release 1.18.2", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000110.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=35317" }, { "name": "48504", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48504" }, { "name": "[MediaWiki-announce] 20120322 MediaWiki security and maintenance release 1.17.3", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000109.html" }, { "name": "[oss-security] 20120322 MediaWiki security and maintenance release 1.18.2", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/03/22/9" }, { "name": "mediawiki-specialupload-csrf(74286)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74286" }, { "name": "52689", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/52689" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-1580", "datePublished": "2012-09-09T21:00:00", "dateReserved": "2012-03-12T00:00:00", "dateUpdated": "2024-08-06T19:01:02.473Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-5687
Vulnerability from cvelistv5
Published
2008-12-19 17:00
Modified
2024-08-07 11:04
Severity ?
EPSS score ?
Summary
MediaWiki 1.11, and other versions before 1.13.3, does not properly protect against the download of backups of deleted images, which might allow remote attackers to obtain sensitive information via requests for files in images/deleted/.
References
▼ | URL | Tags |
---|---|---|
https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01309.html | vendor-advisory, x_refsource_FEDORA | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2008-December/000080.html | mailing-list, x_refsource_MLIST | |
https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01256.html | vendor-advisory, x_refsource_FEDORA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/47678 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/33349 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T11:04:44.334Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "FEDORA-2008-11802", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01309.html" }, { "name": "[mediawiki-announce] 20081215 MediaWiki 1.13.3, 1.12.2, 1.6.11 security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2008-December/000080.html" }, { "name": "FEDORA-2008-11688", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01256.html" }, { "name": "mediawiki-images-info-disclosure(47678)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47678" }, { "name": "33349", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33349" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-12-15T00:00:00", "descriptions": [ { "lang": "en", "value": "MediaWiki 1.11, and other versions before 1.13.3, does not properly protect against the download of backups of deleted images, which might allow remote attackers to obtain sensitive information via requests for files in images/deleted/." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-07T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "FEDORA-2008-11802", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01309.html" }, { "name": "[mediawiki-announce] 20081215 MediaWiki 1.13.3, 1.12.2, 1.6.11 security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2008-December/000080.html" }, { "name": "FEDORA-2008-11688", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01256.html" }, { "name": "mediawiki-images-info-disclosure(47678)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47678" }, { "name": "33349", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33349" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-5687", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MediaWiki 1.11, and other versions before 1.13.3, does not properly protect against the download of backups of deleted images, which might allow remote attackers to obtain sensitive information via requests for files in images/deleted/." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "FEDORA-2008-11802", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01309.html" }, { "name": "[mediawiki-announce] 20081215 MediaWiki 1.13.3, 1.12.2, 1.6.11 security update", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2008-December/000080.html" }, { "name": "FEDORA-2008-11688", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01256.html" }, { "name": "mediawiki-images-info-disclosure(47678)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47678" }, { "name": "33349", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33349" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-5687", "datePublished": "2008-12-19T17:00:00", "dateReserved": "2008-12-19T00:00:00", "dateUpdated": "2024-08-07T11:04:44.334Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-8810
Vulnerability from cvelistv5
Published
2017-11-15 08:00
Modified
2024-08-05 16:48
Severity ?
EPSS score ?
Summary
MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2, when a private wiki is configured, provides different error messages for failed login attempts depending on whether the username exists, which allows remote attackers to enumerate account names and conduct brute-force attacks via a series of requests.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1039812 | vdb-entry, x_refsource_SECTRACK | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-November/000216.html | x_refsource_CONFIRM | |
https://www.debian.org/security/2017/dsa-4036 | vendor-advisory, x_refsource_DEBIAN |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2 |
Version: MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T16:48:22.197Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1039812", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039812" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-November/000216.html" }, { "name": "DSA-4036", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2017/dsa-4036" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2", "vendor": "n/a", "versions": [ { "status": "affected", "version": "MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2" } ] } ], "datePublic": "2017-11-15T00:00:00", "descriptions": [ { "lang": "en", "value": "MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2, when a private wiki is configured, provides different error messages for failed login attempts depending on whether the username exists, which allows remote attackers to enumerate account names and conduct brute-force attacks via a series of requests." } ], "problemTypes": [ { "descriptions": [ { "description": "information leak because of response discrepancy", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-16T10:57:01", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "name": "1039812", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039812" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-November/000216.html" }, { "name": "DSA-4036", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2017/dsa-4036" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "ID": "CVE-2017-8810", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2", "version": { "version_data": [ { "version_value": "MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2, when a private wiki is configured, provides different error messages for failed login attempts depending on whether the username exists, which allows remote attackers to enumerate account names and conduct brute-force attacks via a series of requests." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "information leak because of response discrepancy" } ] } ] }, "references": { "reference_data": [ { "name": "1039812", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039812" }, { "name": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-November/000216.html", "refsource": "CONFIRM", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-November/000216.html" }, { "name": "DSA-4036", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2017/dsa-4036" } ] } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2017-8810", "datePublished": "2017-11-15T08:00:00", "dateReserved": "2017-05-07T00:00:00", "dateUpdated": "2024-08-05T16:48:22.197Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-4307
Vulnerability from cvelistv5
Published
2013-09-11 14:00
Modified
2024-08-06 16:38
Severity ?
EPSS score ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in repo/includes/EntityView.php in the Wikibase extension for MediaWiki 1.19.x before 1.19.8, 1.20.x before 1.20.7, and 1.21.x before 1.21.2 allow (1) remote attackers to inject arbitrary web script or HTML via a label in the "In other languages" section or (2) remote administrators to inject arbitrary web script or HTML via a description.
References
▼ | URL | Tags |
---|---|---|
http://seclists.org/oss-sec/2013/q3/553 | mailing-list, x_refsource_MLIST | |
http://www.securityfocus.com/bid/62201 | vdb-entry, x_refsource_BID | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-September/000133.html | mailing-list, x_refsource_MLIST | |
http://osvdb.org/96907 | vdb-entry, x_refsource_OSVDB | |
https://bugzilla.wikimedia.org/show_bug.cgi?id=53472 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/86892 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:38:01.810Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20130904 Re: CVE request: MediaWiki Security Release: 1.21.2, 1.20.7 and 1.19.8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2013/q3/553" }, { "name": "62201", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/62201" }, { "name": "[MediaWiki-announce] 20130903 MediaWiki Security Release: 1.21.2, 1.20.7 and 1.19.8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-September/000133.html" }, { "name": "96907", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/96907" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=53472" }, { "name": "mediawiki-cve20134307-xss(86892)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86892" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-09-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in repo/includes/EntityView.php in the Wikibase extension for MediaWiki 1.19.x before 1.19.8, 1.20.x before 1.20.7, and 1.21.x before 1.21.2 allow (1) remote attackers to inject arbitrary web script or HTML via a label in the \"In other languages\" section or (2) remote administrators to inject arbitrary web script or HTML via a description." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[oss-security] 20130904 Re: CVE request: MediaWiki Security Release: 1.21.2, 1.20.7 and 1.19.8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2013/q3/553" }, { "name": "62201", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/62201" }, { "name": "[MediaWiki-announce] 20130903 MediaWiki Security Release: 1.21.2, 1.20.7 and 1.19.8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-September/000133.html" }, { "name": "96907", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/96907" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=53472" }, { "name": "mediawiki-cve20134307-xss(86892)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86892" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4307", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in repo/includes/EntityView.php in the Wikibase extension for MediaWiki 1.19.x before 1.19.8, 1.20.x before 1.20.7, and 1.21.x before 1.21.2 allow (1) remote attackers to inject arbitrary web script or HTML via a label in the \"In other languages\" section or (2) remote administrators to inject arbitrary web script or HTML via a description." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20130904 Re: CVE request: MediaWiki Security Release: 1.21.2, 1.20.7 and 1.19.8", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2013/q3/553" }, { "name": "62201", "refsource": "BID", "url": "http://www.securityfocus.com/bid/62201" }, { "name": "[MediaWiki-announce] 20130903 MediaWiki Security Release: 1.21.2, 1.20.7 and 1.19.8", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-September/000133.html" }, { "name": "96907", "refsource": "OSVDB", "url": "http://osvdb.org/96907" }, { "name": "https://bugzilla.wikimedia.org/show_bug.cgi?id=53472", "refsource": "CONFIRM", "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=53472" }, { "name": "mediawiki-cve20134307-xss(86892)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86892" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-4307", "datePublished": "2013-09-11T14:00:00", "dateReserved": "2013-06-12T00:00:00", "dateUpdated": "2024-08-06T16:38:01.810Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-45362
Vulnerability from cvelistv5
Published
2023-11-03 00:00
Modified
2024-08-02 20:21
Severity ?
EPSS score ?
Summary
An issue was discovered in DifferenceEngine.php in MediaWiki before 1.35.12, 1.36.x through 1.39.x before 1.39.5, and 1.40.x before 1.40.1. diff-multi-sameuser (aka "X intermediate revisions by the same user not shown") ignores username suppression. This is an information leak.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:21:16.741Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T341529" }, { "name": "[debian-lts-announce] 20231128 [SECURITY] [DLA 3671-1] mediawiki security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00027.html" }, { "name": "FEDORA-2024-2c564b942d", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FU2FGUXXK6TMV6R52VRECLC6XCSQQISY/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in DifferenceEngine.php in MediaWiki before 1.35.12, 1.36.x through 1.39.x before 1.39.5, and 1.40.x before 1.40.1. diff-multi-sameuser (aka \"X intermediate revisions by the same user not shown\") ignores username suppression. This is an information leak." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-10T16:13:41.063078", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T341529" }, { "name": "[debian-lts-announce] 20231128 [SECURITY] [DLA 3671-1] mediawiki security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00027.html" }, { "name": "FEDORA-2024-2c564b942d", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FU2FGUXXK6TMV6R52VRECLC6XCSQQISY/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-45362", "datePublished": "2023-11-03T00:00:00", "dateReserved": "2023-10-09T00:00:00", "dateUpdated": "2024-08-02T20:21:16.741Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2005-2215
Vulnerability from cvelistv5
Published
2005-07-12 04:00
Modified
2024-08-07 22:15
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in MediaWiki before 1.4.x before 1.4.6 and 1.5 before 1.5beta3 allows remote attackers to inject arbitrary web script or HTML via a parameter in the page move template, a different vulnerability than CVE-2005-1888.
References
▼ | URL | Tags |
---|---|---|
http://www.novell.com/linux/security/advisories/2005_19_sr.html | vendor-advisory, x_refsource_SUSE | |
http://sourceforge.net/project/shownotes.php?release_id=340290 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/14181 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/15950 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T22:15:37.768Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SUSE-SR:2005:019", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2005_19_sr.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sourceforge.net/project/shownotes.php?release_id=340290" }, { "name": "14181", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/14181" }, { "name": "15950", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/15950" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-07-07T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in MediaWiki before 1.4.x before 1.4.6 and 1.5 before 1.5beta3 allows remote attackers to inject arbitrary web script or HTML via a parameter in the page move template, a different vulnerability than CVE-2005-1888." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-11-02T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "SUSE-SR:2005:019", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2005_19_sr.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sourceforge.net/project/shownotes.php?release_id=340290" }, { "name": "14181", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/14181" }, { "name": "15950", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/15950" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-2215", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in MediaWiki before 1.4.x before 1.4.6 and 1.5 before 1.5beta3 allows remote attackers to inject arbitrary web script or HTML via a parameter in the page move template, a different vulnerability than CVE-2005-1888." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "SUSE-SR:2005:019", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2005_19_sr.html" }, { "name": "http://sourceforge.net/project/shownotes.php?release_id=340290", "refsource": "CONFIRM", "url": "http://sourceforge.net/project/shownotes.php?release_id=340290" }, { "name": "14181", "refsource": "BID", "url": "http://www.securityfocus.com/bid/14181" }, { "name": "15950", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/15950" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-2215", "datePublished": "2005-07-12T04:00:00", "dateReserved": "2005-07-12T00:00:00", "dateUpdated": "2024-08-07T22:15:37.768Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-35197
Vulnerability from cvelistv5
Published
2021-07-02 12:28
Modified
2024-08-04 00:33
Severity ?
EPSS score ?
Summary
In MediaWiki before 1.31.15, 1.32.x through 1.35.x before 1.35.3, and 1.36.x before 1.36.1, bots have certain unintended API access. When a bot account has a "sitewide block" applied, it is able to still "purge" pages through the MediaWiki Action API (which a "sitewide block" should have prevented).
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T280226 | x_refsource_MISC | |
https://lists.wikimedia.org/hyperkitty/list/mediawiki-announce%40lists.wikimedia.org/thread/YR3X4L2CPSEJVSY543AWEO65TD6APXHP/ | x_refsource_CONFIRM | |
https://security.gentoo.org/glsa/202107-40 | vendor-advisory, x_refsource_GENTOO | |
https://www.debian.org/security/2021/dsa-4979 | vendor-advisory, x_refsource_DEBIAN | |
https://lists.debian.org/debian-lts-announce/2021/10/msg00003.html | mailing-list, x_refsource_MLIST | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QNEAI2T3Y65I55ZB6UE6RMC662RZTGRX/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CJDYJQWT43GBD6GNQ4OW7JOZ6WQ6DZTN/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MDBPECBWN6LWNSWIQMVXK6PP4YFEUYHA/ | vendor-advisory, x_refsource_FEDORA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:33:51.175Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T280226" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://lists.wikimedia.org/hyperkitty/list/mediawiki-announce%40lists.wikimedia.org/thread/YR3X4L2CPSEJVSY543AWEO65TD6APXHP/" }, { "name": "GLSA-202107-40", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202107-40" }, { "name": "DSA-4979", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2021/dsa-4979" }, { "name": "[debian-lts-announce] 20211009 [SECURITY] [DLA 2779-1] mediawiki security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00003.html" }, { "name": "FEDORA-2021-eee8b7514f", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QNEAI2T3Y65I55ZB6UE6RMC662RZTGRX/" }, { "name": "FEDORA-2021-56d8173b5e", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CJDYJQWT43GBD6GNQ4OW7JOZ6WQ6DZTN/" }, { "name": "FEDORA-2021-3dd1b66cbf", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MDBPECBWN6LWNSWIQMVXK6PP4YFEUYHA/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In MediaWiki before 1.31.15, 1.32.x through 1.35.x before 1.35.3, and 1.36.x before 1.36.1, bots have certain unintended API access. When a bot account has a \"sitewide block\" applied, it is able to still \"purge\" pages through the MediaWiki Action API (which a \"sitewide block\" should have prevented)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-30T01:07:03", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T280226" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://lists.wikimedia.org/hyperkitty/list/mediawiki-announce%40lists.wikimedia.org/thread/YR3X4L2CPSEJVSY543AWEO65TD6APXHP/" }, { "name": "GLSA-202107-40", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202107-40" }, { "name": "DSA-4979", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2021/dsa-4979" }, { "name": "[debian-lts-announce] 20211009 [SECURITY] [DLA 2779-1] mediawiki security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00003.html" }, { "name": "FEDORA-2021-eee8b7514f", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QNEAI2T3Y65I55ZB6UE6RMC662RZTGRX/" }, { "name": "FEDORA-2021-56d8173b5e", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CJDYJQWT43GBD6GNQ4OW7JOZ6WQ6DZTN/" }, { "name": "FEDORA-2021-3dd1b66cbf", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MDBPECBWN6LWNSWIQMVXK6PP4YFEUYHA/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-35197", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In MediaWiki before 1.31.15, 1.32.x through 1.35.x before 1.35.3, and 1.36.x before 1.36.1, bots have certain unintended API access. When a bot account has a \"sitewide block\" applied, it is able to still \"purge\" pages through the MediaWiki Action API (which a \"sitewide block\" should have prevented)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T280226", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T280226" }, { "name": "https://lists.wikimedia.org/hyperkitty/list/mediawiki-announce@lists.wikimedia.org/thread/YR3X4L2CPSEJVSY543AWEO65TD6APXHP/", "refsource": "CONFIRM", "url": "https://lists.wikimedia.org/hyperkitty/list/mediawiki-announce@lists.wikimedia.org/thread/YR3X4L2CPSEJVSY543AWEO65TD6APXHP/" }, { "name": "GLSA-202107-40", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202107-40" }, { "name": "DSA-4979", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4979" }, { "name": "[debian-lts-announce] 20211009 [SECURITY] [DLA 2779-1] mediawiki security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00003.html" }, { "name": "FEDORA-2021-eee8b7514f", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QNEAI2T3Y65I55ZB6UE6RMC662RZTGRX/" }, { "name": "FEDORA-2021-56d8173b5e", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CJDYJQWT43GBD6GNQ4OW7JOZ6WQ6DZTN/" }, { "name": "FEDORA-2021-3dd1b66cbf", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MDBPECBWN6LWNSWIQMVXK6PP4YFEUYHA/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-35197", "datePublished": "2021-07-02T12:28:45", "dateReserved": "2021-06-22T00:00:00", "dateUpdated": "2024-08-04T00:33:51.175Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-1580
Vulnerability from cvelistv5
Published
2011-04-27 00:00
Modified
2024-08-06 22:28
Severity ?
EPSS score ?
Summary
The transwiki import functionality in MediaWiki before 1.16.3 does not properly check privileges, which allows remote authenticated users to perform imports from any wgImportSources wiki via a crafted POST request.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:28:41.947Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "FEDORA-2011-5495", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058588.html" }, { "name": "ADV-2011-0978", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0978" }, { "name": "FEDORA-2011-5807", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059235.html" }, { "name": "47354", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/47354" }, { "name": "44142", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44142" }, { "name": "FEDORA-2011-5848", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058910.html" }, { "name": "ADV-2011-1151", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/1151" }, { "name": "DSA-2366", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2366" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=696360" }, { "name": "[mediawiki-announce] 20110412 MediaWiki security release 1.16.3", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-April/000096.html" }, { "name": "mediawiki-transwiki-sec-bypass(66739)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66739" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=28449" }, { "name": "ADV-2011-1100", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/1100" }, { "name": "FEDORA-2011-5812", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059232.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=695577" }, { "name": "[oss-security] 20110413 Re: CVE request: mediawiki 1.16.3", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/04/13/15" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "The transwiki import functionality in MediaWiki before 1.16.3 does not properly check privileges, which allows remote authenticated users to perform imports from any wgImportSources wiki via a crafted POST request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "FEDORA-2011-5495", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058588.html" }, { "name": "ADV-2011-0978", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0978" }, { "name": "FEDORA-2011-5807", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059235.html" }, { "name": "47354", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/47354" }, { "name": "44142", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44142" }, { "name": "FEDORA-2011-5848", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058910.html" }, { "name": "ADV-2011-1151", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/1151" }, { "name": "DSA-2366", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2366" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=696360" }, { "name": "[mediawiki-announce] 20110412 MediaWiki security release 1.16.3", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-April/000096.html" }, { "name": "mediawiki-transwiki-sec-bypass(66739)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66739" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=28449" }, { "name": "ADV-2011-1100", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/1100" }, { "name": "FEDORA-2011-5812", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059232.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=695577" }, { "name": "[oss-security] 20110413 Re: CVE request: mediawiki 1.16.3", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/04/13/15" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-1580", "datePublished": "2011-04-27T00:00:00", "dateReserved": "2011-04-05T00:00:00", "dateUpdated": "2024-08-06T22:28:41.947Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-40598
Vulnerability from cvelistv5
Published
2024-07-06 00:00
Modified
2024-08-02 04:33
Severity ?
EPSS score ?
Summary
An issue was discovered in the CheckUser extension for MediaWiki through 1.42.1. The API can expose suppressed information for log events. (The log_deleted attribute is not applied to entries.)
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-40598", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-31T19:00:46.249564Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-31T19:00:53.565Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T04:33:11.911Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T326867" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the CheckUser extension for MediaWiki through 1.42.1. The API can expose suppressed information for log events. (The log_deleted attribute is not applied to entries.)" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-06T23:26:12.746473", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T326867" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-40598", "datePublished": "2024-07-06T00:00:00", "dateReserved": "2024-07-06T00:00:00", "dateUpdated": "2024-08-02T04:33:11.911Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-6472
Vulnerability from cvelistv5
Published
2014-05-12 14:00
Modified
2024-08-06 17:39
Severity ?
EPSS score ?
Summary
MediaWiki before 1.19.10, 1.2x before 1.21.4, and 1.22.x before 1.22.1 allows remote attackers to obtain information about deleted page via the (1) log API, (2) enhanced RecentChanges, and (3) user watchlists.
References
▼ | URL | Tags |
---|---|---|
http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000138.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T17:39:01.426Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[MediaWiki-announce] 20140114 MediaWiki Security Releases: 1.22.1, 1.21.4 and 1.19.10", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000138.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-01-14T00:00:00", "descriptions": [ { "lang": "en", "value": "MediaWiki before 1.19.10, 1.2x before 1.21.4, and 1.22.x before 1.22.1 allows remote attackers to obtain information about deleted page via the (1) log API, (2) enhanced RecentChanges, and (3) user watchlists." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-05-12T13:57:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[MediaWiki-announce] 20140114 MediaWiki Security Releases: 1.22.1, 1.21.4 and 1.19.10", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000138.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-6472", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MediaWiki before 1.19.10, 1.2x before 1.21.4, and 1.22.x before 1.22.1 allows remote attackers to obtain information about deleted page via the (1) log API, (2) enhanced RecentChanges, and (3) user watchlists." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[MediaWiki-announce] 20140114 MediaWiki Security Releases: 1.22.1, 1.21.4 and 1.19.10", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000138.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-6472", "datePublished": "2014-05-12T14:00:00", "dateReserved": "2013-11-04T00:00:00", "dateUpdated": "2024-08-06T17:39:01.426Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-2185
Vulnerability from cvelistv5
Published
2005-07-10 04:00
Modified
2024-09-16 17:09
Severity ?
EPSS score ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in MediaWiki 1.3.5 allow remote attackers to execute arbitrary scripts and/or SQL queries via (1) the UnicodeConverter extension, (2) raw page views, (3) SpecialIpblocklist, (4) SpecialEmailuser, (5) SpecialMaintenance, and (6) ImagePage.
References
▼ | URL | Tags |
---|---|---|
http://sourceforge.net/project/shownotes.php?release_id=275099 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/11416 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T01:15:01.663Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sourceforge.net/project/shownotes.php?release_id=275099" }, { "name": "11416", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/11416" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in MediaWiki 1.3.5 allow remote attackers to execute arbitrary scripts and/or SQL queries via (1) the UnicodeConverter extension, (2) raw page views, (3) SpecialIpblocklist, (4) SpecialEmailuser, (5) SpecialMaintenance, and (6) ImagePage." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-07-10T04:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sourceforge.net/project/shownotes.php?release_id=275099" }, { "name": "11416", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/11416" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-2185", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in MediaWiki 1.3.5 allow remote attackers to execute arbitrary scripts and/or SQL queries via (1) the UnicodeConverter extension, (2) raw page views, (3) SpecialIpblocklist, (4) SpecialEmailuser, (5) SpecialMaintenance, and (6) ImagePage." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://sourceforge.net/project/shownotes.php?release_id=275099", "refsource": "CONFIRM", "url": "http://sourceforge.net/project/shownotes.php?release_id=275099" }, { "name": "11416", "refsource": "BID", "url": "http://www.securityfocus.com/bid/11416" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-2185", "datePublished": "2005-07-10T04:00:00Z", "dateReserved": "2005-07-10T04:00:00Z", "dateUpdated": "2024-09-16T17:09:05.713Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-4378
Vulnerability from cvelistv5
Published
2017-10-26 20:00
Modified
2024-08-06 20:35
Severity ?
EPSS score ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in MediaWiki before 1.18.5 and 1.19.x before 1.19.2, when unspecified JavaScript gadgets are used, allow remote attackers to inject arbitrary web script or HTML via the userlang parameter to w/index.php.
References
▼ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2012/08/31/6 | mailing-list, x_refsource_MLIST | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2012-August/000119.html | mailing-list, x_refsource_MLIST | |
https://bugzilla.redhat.com/show_bug.cgi?id=853417 | x_refsource_CONFIRM | |
https://phabricator.wikimedia.org/T39587 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2012/08/31/10 | mailing-list, x_refsource_MLIST | |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:35:08.931Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20120831 CVE Request -- MediaWiki 1.19.2 and 1.18.5 multiple security flaws", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/08/31/6" }, { "name": "[MediaWiki-announce] 20120831 MediaWiki security release: 1.19.2 and 1.18.5", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2012-August/000119.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853417" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T39587" }, { "name": "[oss-security] 20120831 Re: CVE Request -- MediaWiki 1.19.2 and 1.18.5 multiple security flaws", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/08/31/10" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-08-31T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in MediaWiki before 1.18.5 and 1.19.x before 1.19.2, when unspecified JavaScript gadgets are used, allow remote attackers to inject arbitrary web script or HTML via the userlang parameter to w/index.php." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-26T19:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[oss-security] 20120831 CVE Request -- MediaWiki 1.19.2 and 1.18.5 multiple security flaws", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/08/31/6" }, { "name": "[MediaWiki-announce] 20120831 MediaWiki security release: 1.19.2 and 1.18.5", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2012-August/000119.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853417" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T39587" }, { "name": "[oss-security] 20120831 Re: CVE Request -- MediaWiki 1.19.2 and 1.18.5 multiple security flaws", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/08/31/10" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-4378", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in MediaWiki before 1.18.5 and 1.19.x before 1.19.2, when unspecified JavaScript gadgets are used, allow remote attackers to inject arbitrary web script or HTML via the userlang parameter to w/index.php." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20120831 CVE Request -- MediaWiki 1.19.2 and 1.18.5 multiple security flaws", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2012/08/31/6" }, { "name": "[MediaWiki-announce] 20120831 MediaWiki security release: 1.19.2 and 1.18.5", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2012-August/000119.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=853417", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853417" }, { "name": "https://phabricator.wikimedia.org/T39587", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T39587" }, { "name": "[oss-security] 20120831 Re: CVE Request -- MediaWiki 1.19.2 and 1.18.5 multiple security flaws", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2012/08/31/10" }, { "name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330", "refsource": "MISC", "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-4378", "datePublished": "2017-10-26T20:00:00", "dateReserved": "2012-08-21T00:00:00", "dateUpdated": "2024-08-06T20:35:08.931Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-42046
Vulnerability from cvelistv5
Published
2021-10-06 20:48
Modified
2024-08-04 03:22
Severity ?
EPSS score ?
Summary
An issue was discovered in the GlobalWatchlist extension in MediaWiki through 1.36.2. The rev-deleted-user and ntimes messages were not properly escaped and allowed for users to inject HTML and JavaScript.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T286385 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/Ib7f9b009730fe0df283cec1169f84c7a83a58b1d | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/Id2204fb5afe591d63764466de35ac0aaa5999983 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:22:25.791Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T286385" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/Ib7f9b009730fe0df283cec1169f84c7a83a58b1d" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/Id2204fb5afe591d63764466de35ac0aaa5999983" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the GlobalWatchlist extension in MediaWiki through 1.36.2. The rev-deleted-user and ntimes messages were not properly escaped and allowed for users to inject HTML and JavaScript." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-29T16:39:11", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T286385" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/Ib7f9b009730fe0df283cec1169f84c7a83a58b1d" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/Id2204fb5afe591d63764466de35ac0aaa5999983" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-42046", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in the GlobalWatchlist extension in MediaWiki through 1.36.2. The rev-deleted-user and ntimes messages were not properly escaped and allowed for users to inject HTML and JavaScript." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T286385", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T286385" }, { "name": "https://gerrit.wikimedia.org/r/q/Ib7f9b009730fe0df283cec1169f84c7a83a58b1d", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/Ib7f9b009730fe0df283cec1169f84c7a83a58b1d" }, { "name": "https://gerrit.wikimedia.org/r/q/Id2204fb5afe591d63764466de35ac0aaa5999983", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/Id2204fb5afe591d63764466de35ac0aaa5999983" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-42046", "datePublished": "2021-10-06T20:48:31", "dateReserved": "2021-10-06T00:00:00", "dateUpdated": "2024-08-04T03:22:25.791Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-37251
Vulnerability from cvelistv5
Published
2023-06-29 00:00
Modified
2024-11-26 19:37
Severity ?
EPSS score ?
Summary
An issue was discovered in the GoogleAnalyticsMetrics extension for MediaWiki through 1.39.3. The googleanalyticstrackurl parser function does not properly escape JavaScript in the onclick handler and does not prevent use of javascript: URLs.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:09:33.307Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T333980" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-37251", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-26T19:37:38.015787Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-26T19:37:48.675Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the GoogleAnalyticsMetrics extension for MediaWiki through 1.39.3. The googleanalyticstrackurl parser function does not properly escape JavaScript in the onclick handler and does not prevent use of javascript: URLs." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-29T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T333980" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-37251", "datePublished": "2023-06-29T00:00:00", "dateReserved": "2023-06-29T00:00:00", "dateUpdated": "2024-11-26T19:37:48.675Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-0504
Vulnerability from cvelistv5
Published
2018-10-04 20:00
Modified
2024-09-17 00:41
Severity ?
EPSS score ?
Summary
Mediawiki 1.31 before 1.31.1, 1.30.1, 1.29.3 and 1.27.5 contains an information disclosure flaw in the Special:Redirect/logid
References
▼ | URL | Tags |
---|---|---|
https://lists.wikimedia.org/pipermail/wikitech-l/2018-September/090849.html | mailing-list, x_refsource_MLIST | |
http://www.securitytracker.com/id/1041695 | vdb-entry, x_refsource_SECTRACK | |
https://phabricator.wikimedia.org/T187638 | x_refsource_CONFIRM | |
https://www.debian.org/security/2018/dsa-4301 | vendor-advisory, x_refsource_DEBIAN | |
https://access.redhat.com/errata/RHSA-2019:3238 | vendor-advisory, x_refsource_REDHAT | |
https://access.redhat.com/errata/RHSA-2019:3813 | vendor-advisory, x_refsource_REDHAT |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:28:11.013Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[wikitech-l] 20180920 Security release: 1.27.5 / 1.29.3 / 1.30.1 / 1.31.1", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2018-September/090849.html" }, { "name": "1041695", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1041695" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T187638" }, { "name": "DSA-4301", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4301" }, { "name": "RHSA-2019:3238", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:3238" }, { "name": "RHSA-2019:3813", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:3813" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "mediawiki", "vendor": "mediawiki", "versions": [ { "status": "affected", "version": "before 1.31.1, 1.30.1, 1.29.3 and 1.27.5" } ] } ], "datePublic": "2018-09-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Mediawiki 1.31 before 1.31.1, 1.30.1, 1.29.3 and 1.27.5 contains an information disclosure flaw in the Special:Redirect/logid" } ], "problemTypes": [ { "descriptions": [ { "description": "Information disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-07T18:06:37", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "name": "[wikitech-l] 20180920 Security release: 1.27.5 / 1.29.3 / 1.30.1 / 1.31.1", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2018-September/090849.html" }, { "name": "1041695", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1041695" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T187638" }, { "name": "DSA-4301", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4301" }, { "name": "RHSA-2019:3238", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:3238" }, { "name": "RHSA-2019:3813", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:3813" } ], "source": { "discovery": "UNKNOWN" }, "title": "Information disclosure in Special:Redirect/logid", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "DATE_PUBLIC": "2018-09-20T21:18:00.000Z", "ID": "CVE-2018-0504", "STATE": "PUBLIC", "TITLE": "Information disclosure in Special:Redirect/logid" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "mediawiki", "version": { "version_data": [ { "version_value": "before 1.31.1, 1.30.1, 1.29.3 and 1.27.5" } ] } } ] }, "vendor_name": "mediawiki" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Mediawiki 1.31 before 1.31.1, 1.30.1, 1.29.3 and 1.27.5 contains an information disclosure flaw in the Special:Redirect/logid" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "[wikitech-l] 20180920 Security release: 1.27.5 / 1.29.3 / 1.30.1 / 1.31.1", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2018-September/090849.html" }, { "name": "1041695", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041695" }, { "name": "https://phabricator.wikimedia.org/T187638", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T187638" }, { "name": "DSA-4301", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4301" }, { "name": "RHSA-2019:3238", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3238" }, { "name": "RHSA-2019:3813", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3813" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2018-0504", "datePublished": "2018-10-04T20:00:00Z", "dateReserved": "2017-11-27T00:00:00", "dateUpdated": "2024-09-17T00:41:51.974Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-0046
Vulnerability from cvelistv5
Published
2019-10-29 13:09
Modified
2024-08-06 18:09
Severity ?
EPSS score ?
Summary
mediawiki allows deleted text to be exposed
References
▼ | URL | Tags |
---|---|---|
https://security-tracker.debian.org/tracker/CVE-2012-0046 | x_refsource_MISC | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-0046 | x_refsource_MISC | |
https://access.redhat.com/security/cve/cve-2012-0046 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:09:17.356Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-tracker.debian.org/tracker/CVE-2012-0046" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-0046" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://access.redhat.com/security/cve/cve-2012-0046" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "mediawiki", "vendor": "mediawiki", "versions": [ { "status": "affected", "version": "1.16" } ] } ], "descriptions": [ { "lang": "en", "value": "mediawiki allows deleted text to be exposed" } ], "problemTypes": [ { "descriptions": [ { "description": "info leak", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-29T13:09:39", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security-tracker.debian.org/tracker/CVE-2012-0046" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-0046" }, { "tags": [ "x_refsource_MISC" ], "url": "https://access.redhat.com/security/cve/cve-2012-0046" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-0046", "datePublished": "2019-10-29T13:09:39", "dateReserved": "2011-12-07T00:00:00", "dateUpdated": "2024-08-06T18:09:17.356Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-44854
Vulnerability from cvelistv5
Published
2022-12-26 00:00
Modified
2024-08-04 04:32
Severity ?
EPSS score ?
Summary
An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. The REST API publicly caches results from private wikis.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:32:13.246Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T292763" }, { "tags": [ "x_transferred" ], "url": "https://security.gentoo.org/glsa/202305-24" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "unknown", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. The REST API publicly caches results from private wikis." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-26T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T292763" }, { "url": "https://security.gentoo.org/glsa/202305-24" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-44854", "datePublished": "2022-12-26T00:00:00", "dateReserved": "2021-12-13T00:00:00", "dateUpdated": "2024-08-04T04:32:13.246Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-45369
Vulnerability from cvelistv5
Published
2023-10-09 00:00
Modified
2024-09-19 18:02
Severity ?
EPSS score ?
Summary
An issue was discovered in the PageTriage extension for MediaWiki before 1.35.12, 1.36.x through 1.39.x before 1.39.5, and 1.40.x before 1.40.1. Usernames of hidden users are exposed.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:21:16.043Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T344359" }, { "tags": [ "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/PageTriage/+/960676" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-45369", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-19T18:02:27.828374Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-19T18:02:39.021Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the PageTriage extension for MediaWiki before 1.35.12, 1.36.x through 1.39.x before 1.39.5, and 1.40.x before 1.40.1. Usernames of hidden users are exposed." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-09T05:33:06.717784", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T344359" }, { "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/PageTriage/+/960676" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-45369", "datePublished": "2023-10-09T00:00:00", "dateReserved": "2023-10-09T00:00:00", "dateUpdated": "2024-09-19T18:02:39.021Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-1951
Vulnerability from cvelistv5
Published
2019-10-31 19:33
Modified
2024-08-06 15:20
Severity ?
EPSS score ?
Summary
A cross-site scripting (XSS) vulnerability in MediaWiki before 1.19.5 and 1.20.x before 1.20.4 and allows remote attackers to inject arbitrary web script or HTML via Lua function names.
References
▼ | URL | Tags |
---|---|---|
https://security-tracker.debian.org/tracker/CVE-2013-1951 | x_refsource_MISC | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1951 | x_refsource_MISC | |
http://security.gentoo.org/glsa/glsa-201310-21.xml | x_refsource_MISC | |
https://bugs.gentoo.org/show_bug.cgi?id=CVE-2013-1951 | x_refsource_MISC | |
http://lists.fedoraproject.org/pipermail/package-announce/2013-April/104022.html | x_refsource_MISC | |
http://lists.fedoraproject.org/pipermail/package-announce/2013-April/104027.html | x_refsource_MISC | |
http://www.openwall.com/lists/oss-security/2013/04/16/12 | x_refsource_MISC | |
http://www.securityfocus.com/bid/59077 | x_refsource_MISC | |
https://phabricator.wikimedia.org/T48084 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | ikimedia Foundation | MediaWiki |
Version: before 1.19.5 and 1.20.x before 1.20.4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:20:37.304Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-tracker.debian.org/tracker/CVE-2013-1951" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1951" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201310-21.xml" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugs.gentoo.org/show_bug.cgi?id=CVE-2013-1951" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/104022.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/104027.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2013/04/16/12" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.securityfocus.com/bid/59077" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T48084" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "MediaWiki", "vendor": "ikimedia Foundation", "versions": [ { "status": "affected", "version": "before 1.19.5 and 1.20.x before 1.20.4" } ] } ], "datePublic": "2013-03-13T00:00:00", "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in MediaWiki before 1.19.5 and 1.20.x before 1.20.4 and allows remote attackers to inject arbitrary web script or HTML via Lua function names." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-Site Scripting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-31T19:33:37", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security-tracker.debian.org/tracker/CVE-2013-1951" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1951" }, { "tags": [ "x_refsource_MISC" ], "url": "http://security.gentoo.org/glsa/glsa-201310-21.xml" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugs.gentoo.org/show_bug.cgi?id=CVE-2013-1951" }, { "tags": [ "x_refsource_MISC" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/104022.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/104027.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.openwall.com/lists/oss-security/2013/04/16/12" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.securityfocus.com/bid/59077" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T48084" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-1951", "datePublished": "2019-10-31T19:33:37", "dateReserved": "2013-02-19T00:00:00", "dateUpdated": "2024-08-06T15:20:37.304Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-1150
Vulnerability from cvelistv5
Published
2010-04-20 15:00
Modified
2024-08-07 01:14
Severity ?
EPSS score ?
Summary
MediaWiki before 1.15.3, and 1.6.x before 1.16.0beta2, does not properly handle a correctly authenticated but unintended login attempt, which makes it easier for remote authenticated users to conduct phishing attacks by arranging for a victim to login to the attacker's account and then execute a crafted user script, related to a "login CSRF" issue.
References
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2010/1055 | vdb-entry, x_refsource_VUPEN | |
http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_16_0beta2/phase3/RELEASE-NOTES | x_refsource_CONFIRM | |
http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_15_3/phase3/RELEASE-NOTES | x_refsource_CONFIRM | |
http://download.wikimedia.org/mediawiki/1.16/mediawiki-1.16.0beta2.patch.gz | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2010/04/08/4 | mailing-list, x_refsource_MLIST | |
http://download.wikimedia.org/mediawiki/1.15/mediawiki-1.15.3.patch.gz | x_refsource_CONFIRM | |
https://bugzilla.wikimedia.org/show_bug.cgi?id=23076 | x_refsource_CONFIRM | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2010-April/000090.html | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2010/04/07/1 | mailing-list, x_refsource_MLIST | |
https://bugzilla.redhat.com/show_bug.cgi?id=580418 | x_refsource_CONFIRM | |
http://www.debian.org/security/2010/dsa-2041 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:14:06.275Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2010-1055", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1055" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_16_0beta2/phase3/RELEASE-NOTES" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_15_3/phase3/RELEASE-NOTES" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://download.wikimedia.org/mediawiki/1.16/mediawiki-1.16.0beta2.patch.gz" }, { "name": "[oss-security] 20100407 Re: CVE Request: MediaWiki 1.15.3 -- Login CSRF", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2010/04/08/4" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://download.wikimedia.org/mediawiki/1.15/mediawiki-1.15.3.patch.gz" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=23076" }, { "name": "[mediawiki-announce] 20100407 MediaWiki security update: 1.15.3 and 1.16.0beta2", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2010-April/000090.html" }, { "name": "[oss-security] 20100406 CVE Request: MediaWiki 1.15.3 -- Login CSRF", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2010/04/07/1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=580418" }, { "name": "DSA-2041", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2010/dsa-2041" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-04-06T00:00:00", "descriptions": [ { "lang": "en", "value": "MediaWiki before 1.15.3, and 1.6.x before 1.16.0beta2, does not properly handle a correctly authenticated but unintended login attempt, which makes it easier for remote authenticated users to conduct phishing attacks by arranging for a victim to login to the attacker\u0027s account and then execute a crafted user script, related to a \"login CSRF\" issue." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-04-30T09:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "ADV-2010-1055", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1055" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_16_0beta2/phase3/RELEASE-NOTES" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_15_3/phase3/RELEASE-NOTES" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://download.wikimedia.org/mediawiki/1.16/mediawiki-1.16.0beta2.patch.gz" }, { "name": "[oss-security] 20100407 Re: CVE Request: MediaWiki 1.15.3 -- Login CSRF", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2010/04/08/4" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://download.wikimedia.org/mediawiki/1.15/mediawiki-1.15.3.patch.gz" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=23076" }, { "name": "[mediawiki-announce] 20100407 MediaWiki security update: 1.15.3 and 1.16.0beta2", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2010-April/000090.html" }, { "name": "[oss-security] 20100406 CVE Request: MediaWiki 1.15.3 -- Login CSRF", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2010/04/07/1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=580418" }, { "name": "DSA-2041", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2010/dsa-2041" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2010-1150", "datePublished": "2010-04-20T15:00:00", "dateReserved": "2010-03-29T00:00:00", "dateUpdated": "2024-08-07T01:14:06.275Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46150
Vulnerability from cvelistv5
Published
2022-01-07 05:53
Modified
2024-08-04 05:02
Severity ?
EPSS score ?
Summary
An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. Special:CheckUserLog allows CheckUser XSS because of date mishandling, as demonstrated by an XSS payload in MediaWiki:October.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T292795 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/plugins/gitiles/mediawiki/extensions/CheckUser/+/79c2c49a18f96b159258958feca90fce964c350a | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:02:10.334Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T292795" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/plugins/gitiles/mediawiki/extensions/CheckUser/+/79c2c49a18f96b159258958feca90fce964c350a" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. Special:CheckUserLog allows CheckUser XSS because of date mishandling, as demonstrated by an XSS payload in MediaWiki:October." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T05:53:30", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T292795" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/plugins/gitiles/mediawiki/extensions/CheckUser/+/79c2c49a18f96b159258958feca90fce964c350a" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-46150", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. Special:CheckUserLog allows CheckUser XSS because of date mishandling, as demonstrated by an XSS payload in MediaWiki:October." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T292795", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T292795" }, { "name": "https://gerrit.wikimedia.org/r/plugins/gitiles/mediawiki/extensions/CheckUser/+/79c2c49a18f96b159258958feca90fce964c350a", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/plugins/gitiles/mediawiki/extensions/CheckUser/+/79c2c49a18f96b159258958feca90fce964c350a" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-46150", "datePublished": "2022-01-07T05:53:30", "dateReserved": "2022-01-07T00:00:00", "dateUpdated": "2024-08-04T05:02:10.334Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28202
Vulnerability from cvelistv5
Published
2022-03-30 00:00
Modified
2024-08-03 05:48
Severity ?
EPSS score ?
Summary
An XSS issue was discovered in MediaWiki before 1.35.6, 1.36.x before 1.36.4, and 1.37.x before 1.37.2. The widthheight, widthheightpage, and nbytes properties of messages are not escaped when used in galleries or Special:RevisionDelete.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:48:37.387Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T297543" }, { "name": "FEDORA-2022-69bc42d6cf", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PT4CHJKOQOVMI65TSNZRNV6FIWU7SGZD/" }, { "name": "[debian-lts-announce] 20220922 [SECURITY] [DLA 3117-1] mediawiki security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00027.html" }, { "name": "DSA-5246", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2022/dsa-5246" }, { "name": "GLSA-202305-24", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202305-24" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An XSS issue was discovered in MediaWiki before 1.35.6, 1.36.x before 1.36.4, and 1.37.x before 1.37.2. The widthheight, widthheightpage, and nbytes properties of messages are not escaped when used in galleries or Special:RevisionDelete." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-21T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T297543" }, { "name": "FEDORA-2022-69bc42d6cf", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PT4CHJKOQOVMI65TSNZRNV6FIWU7SGZD/" }, { "name": "[debian-lts-announce] 20220922 [SECURITY] [DLA 3117-1] mediawiki security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00027.html" }, { "name": "DSA-5246", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2022/dsa-5246" }, { "name": "GLSA-202305-24", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202305-24" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-28202", "datePublished": "2022-03-30T00:00:00", "dateReserved": "2022-03-30T00:00:00", "dateUpdated": "2024-08-03T05:48:37.387Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-8005
Vulnerability from cvelistv5
Published
2015-11-09 18:00
Modified
2024-08-06 08:06
Severity ?
EPSS score ?
Summary
MediaWiki before 1.23.11, 1.24.x before 1.24.4, and 1.25.x before 1.25.3 uses the thumbnail ImageMagick command line argument, which allows remote attackers to obtain the installation path by reading the metadata of a PNG thumbnail file.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T108616 | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1034028 | vdb-entry, x_refsource_SECTRACK | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-October/000181.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:06:31.527Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T108616" }, { "name": "1034028", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1034028" }, { "name": "[MediaWiki-announce] 20151016 Security Release: 1.25.3, 1.24.4 and 1.23.11", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-October/000181.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-10-16T00:00:00", "descriptions": [ { "lang": "en", "value": "MediaWiki before 1.23.11, 1.24.x before 1.24.4, and 1.25.x before 1.25.3 uses the thumbnail ImageMagick command line argument, which allows remote attackers to obtain the installation path by reading the metadata of a PNG thumbnail file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-11-09T17:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T108616" }, { "name": "1034028", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1034028" }, { "name": "[MediaWiki-announce] 20151016 Security Release: 1.25.3, 1.24.4 and 1.23.11", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-October/000181.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-8005", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MediaWiki before 1.23.11, 1.24.x before 1.24.4, and 1.25.x before 1.25.3 uses the thumbnail ImageMagick command line argument, which allows remote attackers to obtain the installation path by reading the metadata of a PNG thumbnail file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T108616", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T108616" }, { "name": "1034028", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034028" }, { "name": "[MediaWiki-announce] 20151016 Security Release: 1.25.3, 1.24.4 and 1.23.11", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-October/000181.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-8005", "datePublished": "2015-11-09T18:00:00", "dateReserved": "2015-10-28T00:00:00", "dateUpdated": "2024-08-06T08:06:31.527Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-0371
Vulnerability from cvelistv5
Published
2022-02-18 22:29
Modified
2024-08-05 13:03
Severity ?
EPSS score ?
Summary
MediaWiki before 1.23.16, 1.24.x through 1.27.x before 1.27.2, and 1.28.x before 1.28.1 allows remote attackers to discover the IP addresses of Wiki visitors via a style="background-image: attr(title url);" attack within a DIV element that has an attacker-controlled URL in the title attribute.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T140591 | x_refsource_MISC | |
https://phabricator.wikimedia.org/T68404 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T13:03:57.104Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T140591" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T68404" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "MediaWiki before 1.23.16, 1.24.x through 1.27.x before 1.27.2, and 1.28.x before 1.28.1 allows remote attackers to discover the IP addresses of Wiki visitors via a style=\"background-image: attr(title url);\" attack within a DIV element that has an attacker-controlled URL in the title attribute." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-18T22:29:30", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T140591" }, { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T68404" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-0371", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MediaWiki before 1.23.16, 1.24.x through 1.27.x before 1.27.2, and 1.28.x before 1.28.1 allows remote attackers to discover the IP addresses of Wiki visitors via a style=\"background-image: attr(title url);\" attack within a DIV element that has an attacker-controlled URL in the title attribute." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T140591", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T140591" }, { "name": "https://phabricator.wikimedia.org/T68404", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T68404" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-0371", "datePublished": "2022-02-18T22:29:30", "dateReserved": "2016-11-29T00:00:00", "dateUpdated": "2024-08-05T13:03:57.104Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-7295
Vulnerability from cvelistv5
Published
2014-10-07 14:00
Modified
2024-08-06 12:47
Severity ?
EPSS score ?
Summary
The (1) Special:Preferences and (2) Special:UserLogin pages in MediaWiki before 1.19.20, 1.22.x before 1.22.12 and 1.23.x before 1.23.5 allows remote authenticated users to conduct cross-site scripting (XSS) attacks or have unspecified other impact via crafted CSS, as demonstrated by modifying MediaWiki:Common.css.
References
▼ | URL | Tags |
---|---|---|
https://bugzilla.wikimedia.org/show_bug.cgi?id=70672 | x_refsource_CONFIRM | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-October/000163.html | mailing-list, x_refsource_MLIST | |
http://www.debian.org/security/2014/dsa-3046 | vendor-advisory, x_refsource_DEBIAN | |
http://secunia.com/advisories/61752 | third-party-advisory, x_refsource_SECUNIA | |
http://seclists.org/oss-sec/2014/q4/67 | mailing-list, x_refsource_MLIST | |
http://www.securityfocus.com/bid/70238 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T12:47:32.276Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=70672" }, { "name": "[MediaWiki-announce] 20141002 MediaWiki Security and Maintenance Releases: 1.19.20, 1.22.12 and 1.23.5", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-October/000163.html" }, { "name": "DSA-3046", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-3046" }, { "name": "61752", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/61752" }, { "name": "[oss-security] 20141002 Re: CVE request: Mediawiki before 1.19.20, 1.22.12, 1.23.5 XSS through CSS", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2014/q4/67" }, { "name": "70238", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/70238" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-10-02T00:00:00", "descriptions": [ { "lang": "en", "value": "The (1) Special:Preferences and (2) Special:UserLogin pages in MediaWiki before 1.19.20, 1.22.x before 1.22.12 and 1.23.x before 1.23.5 allows remote authenticated users to conduct cross-site scripting (XSS) attacks or have unspecified other impact via crafted CSS, as demonstrated by modifying MediaWiki:Common.css." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-04-28T13:57:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=70672" }, { "name": "[MediaWiki-announce] 20141002 MediaWiki Security and Maintenance Releases: 1.19.20, 1.22.12 and 1.23.5", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-October/000163.html" }, { "name": "DSA-3046", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-3046" }, { "name": "61752", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/61752" }, { "name": "[oss-security] 20141002 Re: CVE request: Mediawiki before 1.19.20, 1.22.12, 1.23.5 XSS through CSS", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2014/q4/67" }, { "name": "70238", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/70238" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-7295", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The (1) Special:Preferences and (2) Special:UserLogin pages in MediaWiki before 1.19.20, 1.22.x before 1.22.12 and 1.23.x before 1.23.5 allows remote authenticated users to conduct cross-site scripting (XSS) attacks or have unspecified other impact via crafted CSS, as demonstrated by modifying MediaWiki:Common.css." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.wikimedia.org/show_bug.cgi?id=70672", "refsource": "CONFIRM", "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=70672" }, { "name": "[MediaWiki-announce] 20141002 MediaWiki Security and Maintenance Releases: 1.19.20, 1.22.12 and 1.23.5", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-October/000163.html" }, { "name": "DSA-3046", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-3046" }, { "name": "61752", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/61752" }, { "name": "[oss-security] 20141002 Re: CVE request: Mediawiki before 1.19.20, 1.22.12, 1.23.5 XSS through CSS", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2014/q4/67" }, { "name": "70238", "refsource": "BID", "url": "http://www.securityfocus.com/bid/70238" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-7295", "datePublished": "2014-10-07T14:00:00", "dateReserved": "2014-10-02T00:00:00", "dateUpdated": "2024-08-06T12:47:32.276Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-8626
Vulnerability from cvelistv5
Published
2017-03-23 20:00
Modified
2024-08-06 08:20
Severity ?
EPSS score ?
Summary
The User::randomPassword function in MediaWiki before 1.23.12, 1.24.x before 1.24.5, 1.25.x before 1.25.4, and 1.26.x before 1.26.1 generates passwords smaller than $wgMinimalPasswordLength, which makes it easier for remote attackers to obtain access via a brute-force attack.
References
▼ | URL | Tags |
---|---|---|
https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-December/000186.html | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2015/12/23/7 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2015/12/21/8 | mailing-list, x_refsource_MLIST | |
https://phabricator.wikimedia.org/T115522 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:20:43.535Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[MediaWiki-announce] 20151221 [MediaWiki-announce] Security Release: 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-December/000186.html" }, { "name": "[oss-security] 20151223 Re: CVE requests for MediaWiki 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/12/23/7" }, { "name": "[oss-security] 20151221 CVE requests for MediaWiki 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/12/21/8" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T115522" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-12-21T00:00:00", "descriptions": [ { "lang": "en", "value": "The User::randomPassword function in MediaWiki before 1.23.12, 1.24.x before 1.24.5, 1.25.x before 1.25.4, and 1.26.x before 1.26.1 generates passwords smaller than $wgMinimalPasswordLength, which makes it easier for remote attackers to obtain access via a brute-force attack." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-03-23T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[MediaWiki-announce] 20151221 [MediaWiki-announce] Security Release: 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-December/000186.html" }, { "name": "[oss-security] 20151223 Re: CVE requests for MediaWiki 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/12/23/7" }, { "name": "[oss-security] 20151221 CVE requests for MediaWiki 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/12/21/8" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T115522" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-8626", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The User::randomPassword function in MediaWiki before 1.23.12, 1.24.x before 1.24.5, 1.25.x before 1.25.4, and 1.26.x before 1.26.1 generates passwords smaller than $wgMinimalPasswordLength, which makes it easier for remote attackers to obtain access via a brute-force attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[MediaWiki-announce] 20151221 [MediaWiki-announce] Security Release: 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-December/000186.html" }, { "name": "[oss-security] 20151223 Re: CVE requests for MediaWiki 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/12/23/7" }, { "name": "[oss-security] 20151221 CVE requests for MediaWiki 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/12/21/8" }, { "name": "https://phabricator.wikimedia.org/T115522", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T115522" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-8626", "datePublished": "2017-03-23T20:00:00", "dateReserved": "2015-12-23T00:00:00", "dateUpdated": "2024-08-06T08:20:43.535Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-1582
Vulnerability from cvelistv5
Published
2012-09-09 21:00
Modified
2024-08-06 19:01
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in the wikitext parser in MediaWiki 1.17.x before 1.17.3 and 1.18.x before 1.18.2 allows remote attackers to inject arbitrary web script or HTML via a crafted page with "forged strip item markers," as demonstrated using the CharInsert extension.
References
▼ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2012/03/24/1 | mailing-list, x_refsource_MLIST | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000110.html | mailing-list, x_refsource_MLIST | |
http://secunia.com/advisories/48504 | third-party-advisory, x_refsource_SECUNIA | |
https://bugzilla.wikimedia.org/show_bug.cgi?id=35315 | x_refsource_CONFIRM | |
http://osvdb.org/80363 | vdb-entry, x_refsource_OSVDB | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000109.html | mailing-list, x_refsource_MLIST | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/74288 | vdb-entry, x_refsource_XF | |
http://www.openwall.com/lists/oss-security/2012/03/22/9 | mailing-list, x_refsource_MLIST | |
http://www.securityfocus.com/bid/52689 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:01:02.188Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20120323 CVEs for MediaWiki security and maintenance release 1.18.2", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/03/24/1" }, { "name": "[MediaWiki-announce] 20120322 MediaWiki security and maintenance release 1.18.2", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000110.html" }, { "name": "48504", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48504" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=35315" }, { "name": "80363", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/80363" }, { "name": "[MediaWiki-announce] 20120322 MediaWiki security and maintenance release 1.17.3", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000109.html" }, { "name": "mediawiki-wikitext-xss(74288)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74288" }, { "name": "[oss-security] 20120322 MediaWiki security and maintenance release 1.18.2", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/03/22/9" }, { "name": "52689", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/52689" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-03-22T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the wikitext parser in MediaWiki 1.17.x before 1.17.3 and 1.18.x before 1.18.2 allows remote attackers to inject arbitrary web script or HTML via a crafted page with \"forged strip item markers,\" as demonstrated using the CharInsert extension." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[oss-security] 20120323 CVEs for MediaWiki security and maintenance release 1.18.2", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/03/24/1" }, { "name": "[MediaWiki-announce] 20120322 MediaWiki security and maintenance release 1.18.2", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000110.html" }, { "name": "48504", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48504" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=35315" }, { "name": "80363", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/80363" }, { "name": "[MediaWiki-announce] 20120322 MediaWiki security and maintenance release 1.17.3", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000109.html" }, { "name": "mediawiki-wikitext-xss(74288)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74288" }, { "name": "[oss-security] 20120322 MediaWiki security and maintenance release 1.18.2", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/03/22/9" }, { "name": "52689", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/52689" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-1582", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the wikitext parser in MediaWiki 1.17.x before 1.17.3 and 1.18.x before 1.18.2 allows remote attackers to inject arbitrary web script or HTML via a crafted page with \"forged strip item markers,\" as demonstrated using the CharInsert extension." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20120323 CVEs for MediaWiki security and maintenance release 1.18.2", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2012/03/24/1" }, { "name": "[MediaWiki-announce] 20120322 MediaWiki security and maintenance release 1.18.2", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000110.html" }, { "name": "48504", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48504" }, { "name": "https://bugzilla.wikimedia.org/show_bug.cgi?id=35315", "refsource": "CONFIRM", "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=35315" }, { "name": "80363", "refsource": "OSVDB", "url": "http://osvdb.org/80363" }, { "name": "[MediaWiki-announce] 20120322 MediaWiki security and maintenance release 1.17.3", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000109.html" }, { "name": "mediawiki-wikitext-xss(74288)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74288" }, { "name": "[oss-security] 20120322 MediaWiki security and maintenance release 1.18.2", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2012/03/22/9" }, { "name": "52689", "refsource": "BID", "url": "http://www.securityfocus.com/bid/52689" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-1582", "datePublished": "2012-09-09T21:00:00", "dateReserved": "2012-03-12T00:00:00", "dateUpdated": "2024-08-06T19:01:02.188Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-4381
Vulnerability from cvelistv5
Published
2020-02-08 17:50
Modified
2024-08-06 20:35
Severity ?
EPSS score ?
Summary
MediaWiki before 1.18.5, and 1.19.x before 1.19.2 saves passwords in the local database, (1) which could make it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack or, (2) when an authentication plugin returns a false in the strict function, could allow remote attackers to use old passwords for non-existing accounts in an external authentication system via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330 | x_refsource_MISC | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2012-August/000119.html | x_refsource_MISC | |
http://www.openwall.com/lists/oss-security/2012/08/31/6 | x_refsource_MISC | |
http://www.openwall.com/lists/oss-security/2012/08/31/10 | x_refsource_MISC | |
https://bugzilla.redhat.com/show_bug.cgi?id=853442 | x_refsource_MISC | |
https://phabricator.wikimedia.org/T41184 | x_refsource_MISC | |
http://osvdb.org/show/osvdb/85106 | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:35:09.098Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2012-August/000119.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/08/31/6" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/08/31/10" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853442" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T41184" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://osvdb.org/show/osvdb/85106" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "MediaWiki", "vendor": "n/a", "versions": [ { "status": "affected", "version": "before 1.18.5" }, { "status": "affected", "version": "1.19.x before 1.19.2" } ] } ], "datePublic": "2012-08-31T00:00:00", "descriptions": [ { "lang": "en", "value": "MediaWiki before 1.18.5, and 1.19.x before 1.19.2 saves passwords in the local database, (1) which could make it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack or, (2) when an authentication plugin returns a false in the strict function, could allow remote attackers to use old passwords for non-existing accounts in an external authentication system via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "Password", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-08T17:50:40", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330" }, { "tags": [ "x_refsource_MISC" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2012-August/000119.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.openwall.com/lists/oss-security/2012/08/31/6" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.openwall.com/lists/oss-security/2012/08/31/10" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853442" }, { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T41184" }, { "tags": [ "x_refsource_MISC" ], "url": "http://osvdb.org/show/osvdb/85106" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-4381", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "MediaWiki", "version": { "version_data": [ { "version_value": "before 1.18.5" }, { "version_value": "1.19.x before 1.19.2" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MediaWiki before 1.18.5, and 1.19.x before 1.19.2 saves passwords in the local database, (1) which could make it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack or, (2) when an authentication plugin returns a false in the strict function, could allow remote attackers to use old passwords for non-existing accounts in an external authentication system via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Password" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330", "refsource": "MISC", "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330" }, { "name": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2012-August/000119.html", "refsource": "MISC", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2012-August/000119.html" }, { "name": "http://www.openwall.com/lists/oss-security/2012/08/31/6", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2012/08/31/6" }, { "name": "http://www.openwall.com/lists/oss-security/2012/08/31/10", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2012/08/31/10" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=853442", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853442" }, { "name": "https://phabricator.wikimedia.org/T41184", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T41184" }, { "name": "http://osvdb.org/show/osvdb/85106", "refsource": "MISC", "url": "http://osvdb.org/show/osvdb/85106" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-4381", "datePublished": "2020-02-08T17:50:40", "dateReserved": "2012-08-21T00:00:00", "dateUpdated": "2024-08-06T20:35:09.098Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-6331
Vulnerability from cvelistv5
Published
2017-04-20 17:00
Modified
2024-08-06 01:29
Severity ?
EPSS score ?
Summary
ApiParse in MediaWiki before 1.23.15, 1.26.x before 1.26.4, and 1.27.x before 1.27.1 allows remote attackers to bypass intended per-title read restrictions via a parse action to api.php.
References
▼ | URL | Tags |
---|---|---|
https://lists.wikimedia.org/pipermail/mediawiki-announce/2016-August/000195.html | mailing-list, x_refsource_MLIST | |
https://bugzilla.redhat.com/show_bug.cgi?id=1369613 | x_refsource_CONFIRM | |
https://phabricator.wikimedia.org/T115333 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:29:19.952Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[MediaWiki-announce] 20160823 Security Release - 1.27.1, 1.26.4, 1.23.15", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2016-August/000195.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369613" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T115333" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-08-23T00:00:00", "descriptions": [ { "lang": "en", "value": "ApiParse in MediaWiki before 1.23.15, 1.26.x before 1.26.4, and 1.27.x before 1.27.1 allows remote attackers to bypass intended per-title read restrictions via a parse action to api.php." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-04-20T16:57:02", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[MediaWiki-announce] 20160823 Security Release - 1.27.1, 1.26.4, 1.23.15", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2016-August/000195.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369613" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T115333" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-6331", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ApiParse in MediaWiki before 1.23.15, 1.26.x before 1.26.4, and 1.27.x before 1.27.1 allows remote attackers to bypass intended per-title read restrictions via a parse action to api.php." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[MediaWiki-announce] 20160823 Security Release - 1.27.1, 1.26.4, 1.23.15", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2016-August/000195.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1369613", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369613" }, { "name": "https://phabricator.wikimedia.org/T115333", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T115333" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-6331", "datePublished": "2017-04-20T17:00:00", "dateReserved": "2016-07-26T00:00:00", "dateUpdated": "2024-08-06T01:29:19.952Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-12472
Vulnerability from cvelistv5
Published
2019-07-10 15:55
Modified
2024-08-04 23:24
Severity ?
EPSS score ?
Summary
An Incorrect Access Control vulnerability was found in Wikimedia MediaWiki 1.18.0 through 1.32.1. It is possible to bypass the limits on IP range blocks ($wgBlockCIDRLimit) by using the API. Fixed in 1.32.2, 1.31.2, 1.30.2 and 1.27.6.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T199540 | x_refsource_MISC | |
https://lists.wikimedia.org/pipermail/wikitech-l/2019-June/092152.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:24:38.183Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T199540" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2019-June/092152.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An Incorrect Access Control vulnerability was found in Wikimedia MediaWiki 1.18.0 through 1.32.1. It is possible to bypass the limits on IP range blocks ($wgBlockCIDRLimit) by using the API. Fixed in 1.32.2, 1.31.2, 1.30.2 and 1.27.6." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-07-10T15:55:03", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T199540" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2019-June/092152.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-12472", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An Incorrect Access Control vulnerability was found in Wikimedia MediaWiki 1.18.0 through 1.32.1. It is possible to bypass the limits on IP range blocks ($wgBlockCIDRLimit) by using the API. Fixed in 1.32.2, 1.31.2, 1.30.2 and 1.27.6." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T199540", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T199540" }, { "name": "https://lists.wikimedia.org/pipermail/wikitech-l/2019-June/092152.html", "refsource": "CONFIRM", "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2019-June/092152.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-12472", "datePublished": "2019-07-10T15:55:03", "dateReserved": "2019-05-30T00:00:00", "dateUpdated": "2024-08-04T23:24:38.183Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-2242
Vulnerability from cvelistv5
Published
2014-03-02 02:00
Modified
2024-08-06 10:06
Severity ?
EPSS score ?
Summary
includes/upload/UploadBase.php in MediaWiki before 1.19.12, 1.20.x and 1.21.x before 1.21.6, and 1.22.x before 1.22.3 does not prevent use of invalid namespaces in SVG files, which allows remote attackers to conduct cross-site scripting (XSS) attacks via an SVG upload, as demonstrated by use of a W3C XHTML namespace in conjunction with an IFRAME element.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/65910 | vdb-entry, x_refsource_BID | |
http://openwall.com/lists/oss-security/2014/02/28/1 | mailing-list, x_refsource_MLIST | |
https://gerrit.wikimedia.org/r/#/q/7d923a6b53f7fbcb0cbc3a19797d741bf6f440eb%2Cn%2Cz | x_refsource_CONFIRM | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-February/000141.html | mailing-list, x_refsource_MLIST | |
https://bugzilla.wikimedia.org/show_bug.cgi?id=60771 | x_refsource_CONFIRM | |
http://openwall.com/lists/oss-security/2014/03/01/2 | mailing-list, x_refsource_MLIST | |
https://bugzilla.redhat.com/show_bug.cgi?id=1071135 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:06:00.324Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "65910", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/65910" }, { "name": "[oss-security] 20140228 CVE requests: MediaWiki 1.22.3, 1.21.6 and 1.19.12 release", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2014/02/28/1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/#/q/7d923a6b53f7fbcb0cbc3a19797d741bf6f440eb%2Cn%2Cz" }, { "name": "[mediawiki-announce] 20140228 MediaWiki Security and Maintenance Releases: 1.22.3, 1.21.6 and 1.19.12", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-February/000141.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=60771" }, { "name": "[oss-security] 20140301 Re: CVE requests: MediaWiki 1.22.3, 1.21.6 and 1.19.12 release", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2014/03/01/2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1071135" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-02-28T00:00:00", "descriptions": [ { "lang": "en", "value": "includes/upload/UploadBase.php in MediaWiki before 1.19.12, 1.20.x and 1.21.x before 1.21.6, and 1.22.x before 1.22.3 does not prevent use of invalid namespaces in SVG files, which allows remote attackers to conduct cross-site scripting (XSS) attacks via an SVG upload, as demonstrated by use of a W3C XHTML namespace in conjunction with an IFRAME element." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-05-14T16:57:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "65910", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/65910" }, { "name": "[oss-security] 20140228 CVE requests: MediaWiki 1.22.3, 1.21.6 and 1.19.12 release", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2014/02/28/1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://gerrit.wikimedia.org/r/#/q/7d923a6b53f7fbcb0cbc3a19797d741bf6f440eb%2Cn%2Cz" }, { "name": "[mediawiki-announce] 20140228 MediaWiki Security and Maintenance Releases: 1.22.3, 1.21.6 and 1.19.12", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-February/000141.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=60771" }, { "name": "[oss-security] 20140301 Re: CVE requests: MediaWiki 1.22.3, 1.21.6 and 1.19.12 release", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2014/03/01/2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1071135" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-2242", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "includes/upload/UploadBase.php in MediaWiki before 1.19.12, 1.20.x and 1.21.x before 1.21.6, and 1.22.x before 1.22.3 does not prevent use of invalid namespaces in SVG files, which allows remote attackers to conduct cross-site scripting (XSS) attacks via an SVG upload, as demonstrated by use of a W3C XHTML namespace in conjunction with an IFRAME element." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "65910", "refsource": "BID", "url": "http://www.securityfocus.com/bid/65910" }, { "name": "[oss-security] 20140228 CVE requests: MediaWiki 1.22.3, 1.21.6 and 1.19.12 release", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2014/02/28/1" }, { "name": "https://gerrit.wikimedia.org/r/#/q/7d923a6b53f7fbcb0cbc3a19797d741bf6f440eb,n,z", "refsource": "CONFIRM", "url": "https://gerrit.wikimedia.org/r/#/q/7d923a6b53f7fbcb0cbc3a19797d741bf6f440eb,n,z" }, { "name": "[mediawiki-announce] 20140228 MediaWiki Security and Maintenance Releases: 1.22.3, 1.21.6 and 1.19.12", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-February/000141.html" }, { "name": "https://bugzilla.wikimedia.org/show_bug.cgi?id=60771", "refsource": "CONFIRM", "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=60771" }, { "name": "[oss-security] 20140301 Re: CVE requests: MediaWiki 1.22.3, 1.21.6 and 1.19.12 release", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2014/03/01/2" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1071135", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1071135" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-2242", "datePublished": "2014-03-02T02:00:00", "dateReserved": "2014-02-28T00:00:00", "dateUpdated": "2024-08-06T10:06:00.324Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-4885
Vulnerability from cvelistv5
Published
2012-09-09 21:00
Modified
2024-09-16 23:51
Severity ?
EPSS score ?
Summary
The wikitext parser in MediaWiki 1.17.x before 1.17.3 and 1.18.x before 1.18.2 allows remote attackers to cause a denial of service (infinite loop) via certain input, as demonstrated by the padleft function.
References
▼ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2012/03/24/1 | mailing-list, x_refsource_MLIST | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000110.html | mailing-list, x_refsource_MLIST | |
http://secunia.com/advisories/48504 | third-party-advisory, x_refsource_SECUNIA | |
https://bugzilla.wikimedia.org/show_bug.cgi?id=35315 | x_refsource_CONFIRM | |
https://bugzilla.wikimedia.org/show_bug.cgi?id=22555 | x_refsource_CONFIRM | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000109.html | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2012/03/22/9 | mailing-list, x_refsource_MLIST | |
http://www.securityfocus.com/bid/52689 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:50:17.994Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20120323 CVEs for MediaWiki security and maintenance release 1.18.2", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/03/24/1" }, { "name": "[MediaWiki-announce] 20120322 MediaWiki security and maintenance release 1.18.2", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000110.html" }, { "name": "48504", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48504" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=35315" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=22555" }, { "name": "[MediaWiki-announce] 20120322 MediaWiki security and maintenance release 1.17.3", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000109.html" }, { "name": "[oss-security] 20120322 MediaWiki security and maintenance release 1.18.2", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/03/22/9" }, { "name": "52689", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/52689" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The wikitext parser in MediaWiki 1.17.x before 1.17.3 and 1.18.x before 1.18.2 allows remote attackers to cause a denial of service (infinite loop) via certain input, as demonstrated by the padleft function." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-09-09T21:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[oss-security] 20120323 CVEs for MediaWiki security and maintenance release 1.18.2", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/03/24/1" }, { "name": "[MediaWiki-announce] 20120322 MediaWiki security and maintenance release 1.18.2", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000110.html" }, { "name": "48504", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48504" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=35315" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=22555" }, { "name": "[MediaWiki-announce] 20120322 MediaWiki security and maintenance release 1.17.3", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000109.html" }, { "name": "[oss-security] 20120322 MediaWiki security and maintenance release 1.18.2", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/03/22/9" }, { "name": "52689", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/52689" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-4885", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The wikitext parser in MediaWiki 1.17.x before 1.17.3 and 1.18.x before 1.18.2 allows remote attackers to cause a denial of service (infinite loop) via certain input, as demonstrated by the padleft function." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20120323 CVEs for MediaWiki security and maintenance release 1.18.2", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2012/03/24/1" }, { "name": "[MediaWiki-announce] 20120322 MediaWiki security and maintenance release 1.18.2", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000110.html" }, { "name": "48504", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48504" }, { "name": "https://bugzilla.wikimedia.org/show_bug.cgi?id=35315", "refsource": "CONFIRM", "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=35315" }, { "name": "https://bugzilla.wikimedia.org/show_bug.cgi?id=22555", "refsource": "CONFIRM", "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=22555" }, { "name": "[MediaWiki-announce] 20120322 MediaWiki security and maintenance release 1.17.3", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000109.html" }, { "name": "[oss-security] 20120322 MediaWiki security and maintenance release 1.18.2", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2012/03/22/9" }, { "name": "52689", "refsource": "BID", "url": "http://www.securityfocus.com/bid/52689" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-4885", "datePublished": "2012-09-09T21:00:00Z", "dateReserved": "2012-09-09T00:00:00Z", "dateUpdated": "2024-09-16T23:51:59.586Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-31554
Vulnerability from cvelistv5
Published
2021-04-22 02:29
Modified
2024-08-03 23:03
Severity ?
EPSS score ?
Summary
An issue was discovered in the AbuseFilter extension for MediaWiki through 1.35.2. It improperly handled account blocks for certain automatically created MediaWiki user accounts, thus allowing nefarious users to remain unblocked.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T272244 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/Ie1f4333d5b1c9d17fb2236fe38a31de427a4cc48 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:03:33.304Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T272244" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/Ie1f4333d5b1c9d17fb2236fe38a31de427a4cc48" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the AbuseFilter extension for MediaWiki through 1.35.2. It improperly handled account blocks for certain automatically created MediaWiki user accounts, thus allowing nefarious users to remain unblocked." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-22T02:29:19", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T272244" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/Ie1f4333d5b1c9d17fb2236fe38a31de427a4cc48" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-31554", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in the AbuseFilter extension for MediaWiki through 1.35.2. It improperly handled account blocks for certain automatically created MediaWiki user accounts, thus allowing nefarious users to remain unblocked." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T272244", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T272244" }, { "name": "https://gerrit.wikimedia.org/r/q/Ie1f4333d5b1c9d17fb2236fe38a31de427a4cc48", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/Ie1f4333d5b1c9d17fb2236fe38a31de427a4cc48" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-31554", "datePublished": "2021-04-22T02:29:19", "dateReserved": "2021-04-22T00:00:00", "dateUpdated": "2024-08-03T23:03:33.304Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-0737
Vulnerability from cvelistv5
Published
2009-02-25 20:00
Modified
2024-08-07 04:48
Severity ?
EPSS score ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in the web-based installer (config/index.php) in MediaWiki 1.6 before 1.6.12, 1.12 before 1.12.4, and 1.13 before 1.13.4, when the installer is in active use, allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_6_12/phase3/RELEASE-NOTES | x_refsource_CONFIRM | |
http://www.debian.org/security/2009/dsa-1901 | vendor-advisory, x_refsource_DEBIAN | |
http://secunia.com/advisories/33881 | third-party-advisory, x_refsource_SECUNIA | |
http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_12_4/phase3/RELEASE-NOTES | x_refsource_CONFIRM | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2009-February/000083.html | mailing-list, x_refsource_MLIST | |
http://www.securityfocus.com/bid/33681 | vdb-entry, x_refsource_BID | |
http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_13_4/phase3/RELEASE-NOTES | x_refsource_CONFIRM | |
http://www.vupen.com/english/advisories/2009/0368 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T04:48:51.639Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_6_12/phase3/RELEASE-NOTES" }, { "name": "DSA-1901", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2009/dsa-1901" }, { "name": "33881", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33881" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_12_4/phase3/RELEASE-NOTES" }, { "name": "[MediaWiki-announce] 20090207 MediaWiki releases: security update and new major branch", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2009-February/000083.html" }, { "name": "33681", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/33681" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_13_4/phase3/RELEASE-NOTES" }, { "name": "ADV-2009-0368", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/0368" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-02-07T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in the web-based installer (config/index.php) in MediaWiki 1.6 before 1.6.12, 1.12 before 1.12.4, and 1.13 before 1.13.4, when the installer is in active use, allow remote attackers to inject arbitrary web script or HTML via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-10-14T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_6_12/phase3/RELEASE-NOTES" }, { "name": "DSA-1901", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2009/dsa-1901" }, { "name": "33881", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33881" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_12_4/phase3/RELEASE-NOTES" }, { "name": "[MediaWiki-announce] 20090207 MediaWiki releases: security update and new major branch", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2009-February/000083.html" }, { "name": "33681", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/33681" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_13_4/phase3/RELEASE-NOTES" }, { "name": "ADV-2009-0368", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/0368" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-0737", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in the web-based installer (config/index.php) in MediaWiki 1.6 before 1.6.12, 1.12 before 1.12.4, and 1.13 before 1.13.4, when the installer is in active use, allow remote attackers to inject arbitrary web script or HTML via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_6_12/phase3/RELEASE-NOTES", "refsource": "CONFIRM", "url": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_6_12/phase3/RELEASE-NOTES" }, { "name": "DSA-1901", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2009/dsa-1901" }, { "name": "33881", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33881" }, { "name": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_12_4/phase3/RELEASE-NOTES", "refsource": "CONFIRM", "url": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_12_4/phase3/RELEASE-NOTES" }, { "name": "[MediaWiki-announce] 20090207 MediaWiki releases: security update and new major branch", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2009-February/000083.html" }, { "name": "33681", "refsource": "BID", "url": "http://www.securityfocus.com/bid/33681" }, { "name": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_13_4/phase3/RELEASE-NOTES", "refsource": "CONFIRM", "url": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_13_4/phase3/RELEASE-NOTES" }, { "name": "ADV-2009-0368", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/0368" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-0737", "datePublished": "2009-02-25T20:00:00", "dateReserved": "2009-02-25T00:00:00", "dateUpdated": "2024-08-07T04:48:51.639Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-2788
Vulnerability from cvelistv5
Published
2011-04-27 00:00
Modified
2024-08-07 02:46
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in profileinfo.php in MediaWiki before 1.15.5, when wgEnableProfileInfo is enabled, allows remote attackers to inject arbitrary web script or HTML via the filter parameter.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:46:48.051Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=620225" }, { "name": "FEDORA-2011-5495", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058588.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=620226" }, { "name": "FEDORA-2011-5807", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059235.html" }, { "name": "[oss-security] 20100729 Re: CVE request: mediawiki", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2010/07/29/4" }, { "name": "42024", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/42024" }, { "name": "FEDORA-2011-5848", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058910.html" }, { "name": "[mediawiki-announce] 20100728 MediaWiki security release: 1.16.0 and 1.15.5", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2010-July/000092.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.wikimedia.org/viewvc/mediawiki?view=revision\u0026revision=69952" }, { "name": "FEDORA-2011-5812", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059232.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.wikimedia.org/viewvc/mediawiki?view=revision\u0026revision=69984" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-07-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in profileinfo.php in MediaWiki before 1.15.5, when wgEnableProfileInfo is enabled, allows remote attackers to inject arbitrary web script or HTML via the filter parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-09-07T09:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=620225" }, { "name": "FEDORA-2011-5495", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058588.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=620226" }, { "name": "FEDORA-2011-5807", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059235.html" }, { "name": "[oss-security] 20100729 Re: CVE request: mediawiki", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2010/07/29/4" }, { "name": "42024", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/42024" }, { "name": "FEDORA-2011-5848", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058910.html" }, { "name": "[mediawiki-announce] 20100728 MediaWiki security release: 1.16.0 and 1.15.5", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2010-July/000092.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.wikimedia.org/viewvc/mediawiki?view=revision\u0026revision=69952" }, { "name": "FEDORA-2011-5812", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059232.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.wikimedia.org/viewvc/mediawiki?view=revision\u0026revision=69984" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2010-2788", "datePublished": "2011-04-27T00:00:00", "dateReserved": "2010-07-22T00:00:00", "dateUpdated": "2024-08-07T02:46:48.051Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-1765
Vulnerability from cvelistv5
Published
2011-05-23 22:00
Modified
2024-08-06 22:37
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in MediaWiki before 1.16.5, when Internet Explorer 6 or earlier is used, allows remote attackers to inject arbitrary web script or HTML via an uploaded file accessed with a dangerous extension such as .shtml at the end of the query string, in conjunction with a modified URI path that has a %2E sequence in place of the . (dot) character. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-1578 and CVE-2011-1587.
References
▼ | URL | Tags |
---|---|---|
http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060496.html | vendor-advisory, x_refsource_FEDORA | |
https://bugzilla.redhat.com/show_bug.cgi?id=702512 | x_refsource_CONFIRM | |
http://secunia.com/advisories/44684 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/47722 | vdb-entry, x_refsource_BID | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-May/000098.html | mailing-list, x_refsource_MLIST | |
https://bugzilla.wikimedia.org/show_bug.cgi?id=28534 | x_refsource_CONFIRM | |
http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060435.html | vendor-advisory, x_refsource_FEDORA | |
http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060507.html | vendor-advisory, x_refsource_FEDORA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:37:25.890Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "FEDORA-2011-6774", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060496.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=702512" }, { "name": "44684", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44684" }, { "name": "47722", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/47722" }, { "name": "[mediawiki-announce] 20110505 MediaWiki security release 1.16.5", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-May/000098.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=28534" }, { "name": "FEDORA-2011-6781", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060435.html" }, { "name": "FEDORA-2011-6775", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060507.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-05-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in MediaWiki before 1.16.5, when Internet Explorer 6 or earlier is used, allows remote attackers to inject arbitrary web script or HTML via an uploaded file accessed with a dangerous extension such as .shtml at the end of the query string, in conjunction with a modified URI path that has a %2E sequence in place of the . (dot) character. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-1578 and CVE-2011-1587." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-06-16T09:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "FEDORA-2011-6774", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060496.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=702512" }, { "name": "44684", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44684" }, { "name": "47722", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/47722" }, { "name": "[mediawiki-announce] 20110505 MediaWiki security release 1.16.5", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-May/000098.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=28534" }, { "name": "FEDORA-2011-6781", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060435.html" }, { "name": "FEDORA-2011-6775", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060507.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-1765", "datePublished": "2011-05-23T22:00:00", "dateReserved": "2011-04-19T00:00:00", "dateUpdated": "2024-08-06T22:37:25.890Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-2942
Vulnerability from cvelistv5
Published
2015-04-13 14:00
Modified
2024-08-06 05:32
Severity ?
EPSS score ?
Summary
MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2, when using HHVM, allows remote attackers to cause a denial of service (CPU and memory consumption) via a large number of nested entity references in an (1) SVG file or (2) XMP metadata in a PDF file, aka a "billion laughs attack," a different vulnerability than CVE-2015-2937.
References
▼ | URL | Tags |
---|---|---|
https://security.gentoo.org/glsa/201510-05 | vendor-advisory, x_refsource_GENTOO | |
http://www.securityfocus.com/bid/73477 | vdb-entry, x_refsource_BID | |
http://www.openwall.com/lists/oss-security/2015/04/07/3 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2015/04/01/1 | mailing-list, x_refsource_MLIST | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html | mailing-list, x_refsource_MLIST | |
https://phabricator.wikimedia.org/T85848 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:32:20.575Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201510-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201510-05" }, { "name": "73477", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/73477" }, { "name": "[oss-security] 20150407 Re: CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/04/07/3" }, { "name": "[oss-security] 20150331 CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/04/01/1" }, { "name": "[MediaWiki-announce] 20150331 MediaWiki Security and Maintenance Releases: 1.19.24, 1.23.9, and 1.24.2", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T85848" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-03-31T00:00:00", "descriptions": [ { "lang": "en", "value": "MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2, when using HHVM, allows remote attackers to cause a denial of service (CPU and memory consumption) via a large number of nested entity references in an (1) SVG file or (2) XMP metadata in a PDF file, aka a \"billion laughs attack,\" a different vulnerability than CVE-2015-2937." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-05T21:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "GLSA-201510-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201510-05" }, { "name": "73477", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/73477" }, { "name": "[oss-security] 20150407 Re: CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/04/07/3" }, { "name": "[oss-security] 20150331 CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/04/01/1" }, { "name": "[MediaWiki-announce] 20150331 MediaWiki Security and Maintenance Releases: 1.19.24, 1.23.9, and 1.24.2", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T85848" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-2942", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2, when using HHVM, allows remote attackers to cause a denial of service (CPU and memory consumption) via a large number of nested entity references in an (1) SVG file or (2) XMP metadata in a PDF file, aka a \"billion laughs attack,\" a different vulnerability than CVE-2015-2937." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201510-05", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201510-05" }, { "name": "73477", "refsource": "BID", "url": "http://www.securityfocus.com/bid/73477" }, { "name": "[oss-security] 20150407 Re: CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/04/07/3" }, { "name": "[oss-security] 20150331 CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/04/01/1" }, { "name": "[MediaWiki-announce] 20150331 MediaWiki Security and Maintenance Releases: 1.19.24, 1.23.9, and 1.24.2", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html" }, { "name": "https://phabricator.wikimedia.org/T85848", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T85848" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-2942", "datePublished": "2015-04-13T14:00:00", "dateReserved": "2015-04-07T00:00:00", "dateUpdated": "2024-08-06T05:32:20.575Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-8814
Vulnerability from cvelistv5
Published
2017-11-15 08:00
Modified
2024-08-05 16:48
Severity ?
EPSS score ?
Summary
The language converter in MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2 allows attackers to replace text inside tags via a rule definition followed by "a lot of junk."
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1039812 | vdb-entry, x_refsource_SECTRACK | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-November/000216.html | x_refsource_CONFIRM | |
https://www.debian.org/security/2017/dsa-4036 | vendor-advisory, x_refsource_DEBIAN |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2 |
Version: MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T16:48:21.905Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1039812", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039812" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-November/000216.html" }, { "name": "DSA-4036", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2017/dsa-4036" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2", "vendor": "n/a", "versions": [ { "status": "affected", "version": "MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2" } ] } ], "datePublic": "2017-11-15T00:00:00", "descriptions": [ { "lang": "en", "value": "The language converter in MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2 allows attackers to replace text inside tags via a rule definition followed by \"a lot of junk.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "unrestricted text replacement", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-16T10:57:01", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "name": "1039812", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039812" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-November/000216.html" }, { "name": "DSA-4036", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2017/dsa-4036" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "ID": "CVE-2017-8814", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2", "version": { "version_data": [ { "version_value": "MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The language converter in MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2 allows attackers to replace text inside tags via a rule definition followed by \"a lot of junk.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "unrestricted text replacement" } ] } ] }, "references": { "reference_data": [ { "name": "1039812", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039812" }, { "name": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-November/000216.html", "refsource": "CONFIRM", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-November/000216.html" }, { "name": "DSA-4036", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2017/dsa-4036" } ] } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2017-8814", "datePublished": "2017-11-15T08:00:00", "dateReserved": "2017-05-07T00:00:00", "dateUpdated": "2024-08-05T16:48:21.905Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-4304
Vulnerability from cvelistv5
Published
2014-01-26 20:00
Modified
2024-08-06 16:38
Severity ?
EPSS score ?
Summary
The CentralAuth extension for MediaWiki 1.19.x before 1.19.8, 1.20.x before 1.20.7, and 1.21.x before 1.21.2 caches a valid CentralAuthUser object in the centralauth_User cookie even when a user has not successfully logged in, which allows remote attackers to bypass authentication without a password.
References
▼ | URL | Tags |
---|---|---|
http://seclists.org/oss-sec/2013/q3/553 | mailing-list, x_refsource_MLIST | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/86894 | vdb-entry, x_refsource_XF | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-September/000133.html | mailing-list, x_refsource_MLIST | |
https://bugzilla.wikimedia.org/show_bug.cgi?id=52338 | x_refsource_CONFIRM | |
http://osvdb.org/96910 | vdb-entry, x_refsource_OSVDB | |
http://secunia.com/advisories/54723 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:38:01.869Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20130904 Re: CVE request: MediaWiki Security Release: 1.21.2, 1.20.7 and 1.19.8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2013/q3/553" }, { "name": "mediawiki-cve20134304-security-bypass(86894)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86894" }, { "name": "[MediaWiki-announce] 20130903 MediaWiki Security Release: 1.21.2, 1.20.7 and 1.19.8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-September/000133.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=52338" }, { "name": "96910", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/96910" }, { "name": "54723", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54723" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-09-03T00:00:00", "descriptions": [ { "lang": "en", "value": "The CentralAuth extension for MediaWiki 1.19.x before 1.19.8, 1.20.x before 1.20.7, and 1.21.x before 1.21.2 caches a valid CentralAuthUser object in the centralauth_User cookie even when a user has not successfully logged in, which allows remote attackers to bypass authentication without a password." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[oss-security] 20130904 Re: CVE request: MediaWiki Security Release: 1.21.2, 1.20.7 and 1.19.8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2013/q3/553" }, { "name": "mediawiki-cve20134304-security-bypass(86894)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86894" }, { "name": "[MediaWiki-announce] 20130903 MediaWiki Security Release: 1.21.2, 1.20.7 and 1.19.8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-September/000133.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=52338" }, { "name": "96910", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/96910" }, { "name": "54723", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54723" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4304", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The CentralAuth extension for MediaWiki 1.19.x before 1.19.8, 1.20.x before 1.20.7, and 1.21.x before 1.21.2 caches a valid CentralAuthUser object in the centralauth_User cookie even when a user has not successfully logged in, which allows remote attackers to bypass authentication without a password." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20130904 Re: CVE request: MediaWiki Security Release: 1.21.2, 1.20.7 and 1.19.8", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2013/q3/553" }, { "name": "mediawiki-cve20134304-security-bypass(86894)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86894" }, { "name": "[MediaWiki-announce] 20130903 MediaWiki Security Release: 1.21.2, 1.20.7 and 1.19.8", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-September/000133.html" }, { "name": "https://bugzilla.wikimedia.org/show_bug.cgi?id=52338", "refsource": "CONFIRM", "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=52338" }, { "name": "96910", "refsource": "OSVDB", "url": "http://osvdb.org/96910" }, { "name": "54723", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54723" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-4304", "datePublished": "2014-01-26T20:00:00", "dateReserved": "2013-06-12T00:00:00", "dateUpdated": "2024-08-06T16:38:01.869Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-9507
Vulnerability from cvelistv5
Published
2015-01-04 21:00
Modified
2024-08-06 13:47
Severity ?
EPSS score ?
Summary
MediaWiki 1.21.x, 1.22.x before 1.22.14, and 1.23.x before 1.23.7, when $wgContentHandlerUseDB is enabled, allows remote attackers to conduct cross-site scripting (XSS) attacks by setting the content model for a revision to JS.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T72901 | x_refsource_CONFIRM | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-November/000170.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:47:40.981Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T72901" }, { "name": "[MediaWiki-announce] 20141127 MediaWiki Security and Maintenance Releases: 1.23.7, 1.22.14 and 1.19.22", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-November/000170.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-11-27T00:00:00", "descriptions": [ { "lang": "en", "value": "MediaWiki 1.21.x, 1.22.x before 1.22.14, and 1.23.x before 1.23.7, when $wgContentHandlerUseDB is enabled, allows remote attackers to conduct cross-site scripting (XSS) attacks by setting the content model for a revision to JS." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-01-12T14:57:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T72901" }, { "name": "[MediaWiki-announce] 20141127 MediaWiki Security and Maintenance Releases: 1.23.7, 1.22.14 and 1.19.22", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-November/000170.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-9507", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MediaWiki 1.21.x, 1.22.x before 1.22.14, and 1.23.x before 1.23.7, when $wgContentHandlerUseDB is enabled, allows remote attackers to conduct cross-site scripting (XSS) attacks by setting the content model for a revision to JS." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T72901", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T72901" }, { "name": "[MediaWiki-announce] 20141127 MediaWiki Security and Maintenance Releases: 1.23.7, 1.22.14 and 1.19.22", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-November/000170.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-9507", "datePublished": "2015-01-04T21:00:00", "dateReserved": "2015-01-04T00:00:00", "dateUpdated": "2024-08-06T13:47:40.981Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-8628
Vulnerability from cvelistv5
Published
2017-03-23 20:00
Modified
2024-08-06 08:20
Severity ?
EPSS score ?
Summary
The (1) Special:MyPage, (2) Special:MyTalk, (3) Special:MyContributions, (4) Special:MyUploads, and (5) Special:AllMyUploads pages in MediaWiki before 1.23.12, 1.24.x before 1.24.5, 1.25.x before 1.25.4, and 1.26.x before 1.26.1 allow remote attackers to obtain sensitive user login information via crafted links combined with page view statistics.
References
▼ | URL | Tags |
---|---|---|
https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-December/000186.html | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2015/12/23/7 | mailing-list, x_refsource_MLIST | |
https://phabricator.wikimedia.org/T109724 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2015/12/21/8 | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:20:43.576Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[MediaWiki-announce] 20151221 [MediaWiki-announce] Security Release: 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-December/000186.html" }, { "name": "[oss-security] 20151223 Re: CVE requests for MediaWiki 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/12/23/7" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T109724" }, { "name": "[oss-security] 20151221 CVE requests for MediaWiki 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/12/21/8" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-12-21T00:00:00", "descriptions": [ { "lang": "en", "value": "The (1) Special:MyPage, (2) Special:MyTalk, (3) Special:MyContributions, (4) Special:MyUploads, and (5) Special:AllMyUploads pages in MediaWiki before 1.23.12, 1.24.x before 1.24.5, 1.25.x before 1.25.4, and 1.26.x before 1.26.1 allow remote attackers to obtain sensitive user login information via crafted links combined with page view statistics." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-03-23T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[MediaWiki-announce] 20151221 [MediaWiki-announce] Security Release: 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-December/000186.html" }, { "name": "[oss-security] 20151223 Re: CVE requests for MediaWiki 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/12/23/7" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T109724" }, { "name": "[oss-security] 20151221 CVE requests for MediaWiki 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/12/21/8" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-8628", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The (1) Special:MyPage, (2) Special:MyTalk, (3) Special:MyContributions, (4) Special:MyUploads, and (5) Special:AllMyUploads pages in MediaWiki before 1.23.12, 1.24.x before 1.24.5, 1.25.x before 1.25.4, and 1.26.x before 1.26.1 allow remote attackers to obtain sensitive user login information via crafted links combined with page view statistics." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[MediaWiki-announce] 20151221 [MediaWiki-announce] Security Release: 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-December/000186.html" }, { "name": "[oss-security] 20151223 Re: CVE requests for MediaWiki 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/12/23/7" }, { "name": "https://phabricator.wikimedia.org/T109724", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T109724" }, { "name": "[oss-security] 20151221 CVE requests for MediaWiki 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/12/21/8" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-8628", "datePublished": "2017-03-23T20:00:00", "dateReserved": "2015-12-23T00:00:00", "dateUpdated": "2024-08-06T08:20:43.576Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-42045
Vulnerability from cvelistv5
Published
2021-10-06 20:49
Modified
2024-08-04 03:22
Severity ?
EPSS score ?
Summary
An issue was discovered in SecurePoll in the Growth extension in MediaWiki through 1.36.2. Simple polls allow users to create alerts by changing their User-Agent HTTP header and submitting a vote.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T289385 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/I4f04083cd00884d3b85245460774c81c7639a578 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:22:25.967Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T289385" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/I4f04083cd00884d3b85245460774c81c7639a578" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in SecurePoll in the Growth extension in MediaWiki through 1.36.2. Simple polls allow users to create alerts by changing their User-Agent HTTP header and submitting a vote." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-29T16:39:09", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T289385" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/I4f04083cd00884d3b85245460774c81c7639a578" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-42045", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in SecurePoll in the Growth extension in MediaWiki through 1.36.2. Simple polls allow users to create alerts by changing their User-Agent HTTP header and submitting a vote." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T289385", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T289385" }, { "name": "https://gerrit.wikimedia.org/r/q/I4f04083cd00884d3b85245460774c81c7639a578", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/I4f04083cd00884d3b85245460774c81c7639a578" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-42045", "datePublished": "2021-10-06T20:49:18", "dateReserved": "2021-10-06T00:00:00", "dateUpdated": "2024-08-04T03:22:25.967Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-6337
Vulnerability from cvelistv5
Published
2017-04-20 17:00
Modified
2024-08-06 01:29
Severity ?
EPSS score ?
Summary
MediaWiki 1.27.x before 1.27.1 might allow remote attackers to bypass intended session access restrictions by leveraging a call to the UserGetRights function after Session::getAllowedUserRights.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T139670 | x_refsource_CONFIRM | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2016-August/000195.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:29:19.198Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T139670" }, { "name": "[MediaWiki-announce] 20160823 Security Release - 1.27.1, 1.26.4, 1.23.15", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2016-August/000195.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-08-23T00:00:00", "descriptions": [ { "lang": "en", "value": "MediaWiki 1.27.x before 1.27.1 might allow remote attackers to bypass intended session access restrictions by leveraging a call to the UserGetRights function after Session::getAllowedUserRights." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-04-20T16:57:02", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T139670" }, { "name": "[MediaWiki-announce] 20160823 Security Release - 1.27.1, 1.26.4, 1.23.15", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2016-August/000195.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-6337", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MediaWiki 1.27.x before 1.27.1 might allow remote attackers to bypass intended session access restrictions by leveraging a call to the UserGetRights function after Session::getAllowedUserRights." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T139670", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T139670" }, { "name": "[MediaWiki-announce] 20160823 Security Release - 1.27.1, 1.26.4, 1.23.15", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2016-August/000195.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-6337", "datePublished": "2017-04-20T17:00:00", "dateReserved": "2016-07-26T00:00:00", "dateUpdated": "2024-08-06T01:29:19.198Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-2853
Vulnerability from cvelistv5
Published
2014-04-29 18:00
Modified
2024-08-06 10:28
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in includes/actions/InfoAction.php in MediaWiki before 1.21.9 and 1.22.x before 1.22.6 allows remote attackers to inject arbitrary web script or HTML via the sort key in an info action.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/67068 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id/1030161 | vdb-entry, x_refsource_SECTRACK | |
http://secunia.com/advisories/58262 | third-party-advisory, x_refsource_SECUNIA | |
https://github.com/wikimedia/mediawiki-core/commit/0b695ae09aada343ab59be4a3c9963995a1143b6 | x_refsource_MISC | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-April/000149.html | mailing-list, x_refsource_MLIST | |
https://www.mediawiki.org/wiki/Release_notes/1.22#Changes_since_1.22.5 | x_refsource_CONFIRM | |
https://bugzilla.wikimedia.org/show_bug.cgi?id=63251 | x_refsource_CONFIRM | |
https://www.mediawiki.org/wiki/Release_notes/1.21#Changes_since_1.21.8 | x_refsource_CONFIRM | |
https://bugzilla.redhat.com/show_bug.cgi?id=1091967 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:28:46.374Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "67068", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/67068" }, { "name": "1030161", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1030161" }, { "name": "58262", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/58262" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/wikimedia/mediawiki-core/commit/0b695ae09aada343ab59be4a3c9963995a1143b6" }, { "name": "[MediaWiki-announce] 20140424 MediaWiki Security and Maintenance Releases: 1.22.6 and 1.21.9", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-April/000149.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mediawiki.org/wiki/Release_notes/1.22#Changes_since_1.22.5" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=63251" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mediawiki.org/wiki/Release_notes/1.21#Changes_since_1.21.8" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1091967" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-04-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in includes/actions/InfoAction.php in MediaWiki before 1.21.9 and 1.22.x before 1.22.6 allows remote attackers to inject arbitrary web script or HTML via the sort key in an info action." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-05-12T18:57:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "67068", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/67068" }, { "name": "1030161", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1030161" }, { "name": "58262", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/58262" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/wikimedia/mediawiki-core/commit/0b695ae09aada343ab59be4a3c9963995a1143b6" }, { "name": "[MediaWiki-announce] 20140424 MediaWiki Security and Maintenance Releases: 1.22.6 and 1.21.9", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-April/000149.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mediawiki.org/wiki/Release_notes/1.22#Changes_since_1.22.5" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=63251" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mediawiki.org/wiki/Release_notes/1.21#Changes_since_1.21.8" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1091967" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-2853", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in includes/actions/InfoAction.php in MediaWiki before 1.21.9 and 1.22.x before 1.22.6 allows remote attackers to inject arbitrary web script or HTML via the sort key in an info action." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "67068", "refsource": "BID", "url": "http://www.securityfocus.com/bid/67068" }, { "name": "1030161", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1030161" }, { "name": "58262", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/58262" }, { "name": "https://github.com/wikimedia/mediawiki-core/commit/0b695ae09aada343ab59be4a3c9963995a1143b6", "refsource": "MISC", "url": "https://github.com/wikimedia/mediawiki-core/commit/0b695ae09aada343ab59be4a3c9963995a1143b6" }, { "name": "[MediaWiki-announce] 20140424 MediaWiki Security and Maintenance Releases: 1.22.6 and 1.21.9", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-April/000149.html" }, { "name": "https://www.mediawiki.org/wiki/Release_notes/1.22#Changes_since_1.22.5", "refsource": "CONFIRM", "url": "https://www.mediawiki.org/wiki/Release_notes/1.22#Changes_since_1.22.5" }, { "name": "https://bugzilla.wikimedia.org/show_bug.cgi?id=63251", "refsource": "CONFIRM", "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=63251" }, { "name": "https://www.mediawiki.org/wiki/Release_notes/1.21#Changes_since_1.21.8", "refsource": "CONFIRM", "url": "https://www.mediawiki.org/wiki/Release_notes/1.21#Changes_since_1.21.8" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1091967", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1091967" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-2853", "datePublished": "2014-04-29T18:00:00", "dateReserved": "2014-04-14T00:00:00", "dateUpdated": "2024-08-06T10:28:46.374Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-2243
Vulnerability from cvelistv5
Published
2014-03-02 02:00
Modified
2024-08-06 10:06
Severity ?
EPSS score ?
Summary
includes/User.php in MediaWiki before 1.19.12, 1.20.x and 1.21.x before 1.21.6, and 1.22.x before 1.22.3 terminates validation of a user token upon encountering the first incorrect character, which makes it easier for remote attackers to obtain access via a brute-force attack that relies on timing differences in responses to incorrect token guesses.
References
▼ | URL | Tags |
---|---|---|
http://openwall.com/lists/oss-security/2014/02/28/1 | mailing-list, x_refsource_MLIST | |
https://bugzilla.wikimedia.org/show_bug.cgi?id=61346 | x_refsource_CONFIRM | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-February/000141.html | mailing-list, x_refsource_MLIST | |
https://bugzilla.redhat.com/show_bug.cgi?id=1071136 | x_refsource_CONFIRM | |
http://openwall.com/lists/oss-security/2014/03/01/2 | mailing-list, x_refsource_MLIST | |
https://gerrit.wikimedia.org/r/#/q/I2a9e89120f7092015495e638c6fa9f67adc9b84f%2Cn%2Cz | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:06:00.267Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20140228 CVE requests: MediaWiki 1.22.3, 1.21.6 and 1.19.12 release", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2014/02/28/1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=61346" }, { "name": "[mediawiki-announce] 20140228 MediaWiki Security and Maintenance Releases: 1.22.3, 1.21.6 and 1.19.12", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-February/000141.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1071136" }, { "name": "[oss-security] 20140301 Re: CVE requests: MediaWiki 1.22.3, 1.21.6 and 1.19.12 release", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2014/03/01/2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/#/q/I2a9e89120f7092015495e638c6fa9f67adc9b84f%2Cn%2Cz" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-02-28T00:00:00", "descriptions": [ { "lang": "en", "value": "includes/User.php in MediaWiki before 1.19.12, 1.20.x and 1.21.x before 1.21.6, and 1.22.x before 1.22.3 terminates validation of a user token upon encountering the first incorrect character, which makes it easier for remote attackers to obtain access via a brute-force attack that relies on timing differences in responses to incorrect token guesses." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-03-02T02:57:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[oss-security] 20140228 CVE requests: MediaWiki 1.22.3, 1.21.6 and 1.19.12 release", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2014/02/28/1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=61346" }, { "name": "[mediawiki-announce] 20140228 MediaWiki Security and Maintenance Releases: 1.22.3, 1.21.6 and 1.19.12", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-February/000141.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1071136" }, { "name": "[oss-security] 20140301 Re: CVE requests: MediaWiki 1.22.3, 1.21.6 and 1.19.12 release", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2014/03/01/2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://gerrit.wikimedia.org/r/#/q/I2a9e89120f7092015495e638c6fa9f67adc9b84f%2Cn%2Cz" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-2243", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "includes/User.php in MediaWiki before 1.19.12, 1.20.x and 1.21.x before 1.21.6, and 1.22.x before 1.22.3 terminates validation of a user token upon encountering the first incorrect character, which makes it easier for remote attackers to obtain access via a brute-force attack that relies on timing differences in responses to incorrect token guesses." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20140228 CVE requests: MediaWiki 1.22.3, 1.21.6 and 1.19.12 release", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2014/02/28/1" }, { "name": "https://bugzilla.wikimedia.org/show_bug.cgi?id=61346", "refsource": "CONFIRM", "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=61346" }, { "name": "[mediawiki-announce] 20140228 MediaWiki Security and Maintenance Releases: 1.22.3, 1.21.6 and 1.19.12", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-February/000141.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1071136", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1071136" }, { "name": "[oss-security] 20140301 Re: CVE requests: MediaWiki 1.22.3, 1.21.6 and 1.19.12 release", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2014/03/01/2" }, { "name": "https://gerrit.wikimedia.org/r/#/q/I2a9e89120f7092015495e638c6fa9f67adc9b84f,n,z", "refsource": "CONFIRM", "url": "https://gerrit.wikimedia.org/r/#/q/I2a9e89120f7092015495e638c6fa9f67adc9b84f,n,z" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-2243", "datePublished": "2014-03-02T02:00:00", "dateReserved": "2014-02-28T00:00:00", "dateUpdated": "2024-08-06T10:06:00.267Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-36675
Vulnerability from cvelistv5
Published
2023-06-26 00:00
Modified
2024-12-05 15:25
Severity ?
EPSS score ?
Summary
An issue was discovered in MediaWiki before 1.35.11, 1.36.x through 1.38.x before 1.38.7, and 1.39.x before 1.39.4. BlockLogFormatter.php in BlockLogFormatter allows XSS in the partial blocks feature.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:52:54.186Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T332889" }, { "tags": [ "x_transferred" ], "url": "https://www.mediawiki.org/wiki/Release_notes/1.40#Other_changes_in_1.40" }, { "name": "DSA-5447", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5447" }, { "name": "FEDORA-2023-1fcaba0998", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DOAXEGYBOEM4JWB4J3BDH73NK2LCYC3O/" }, { "name": "FEDORA-2023-d8ae3c122e", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UIVGYECQGTUC2LLPVCZBPDLCTOHL2F6/" }, { "name": "FEDORA-2023-7e9d6015f6", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CHRX6DSLAMVXCV2YMJEWOLTBEYSESE5/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-36675", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-05T15:24:50.715733Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-05T15:25:03.755Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MediaWiki before 1.35.11, 1.36.x through 1.38.x before 1.38.7, and 1.39.x before 1.39.4. BlockLogFormatter.php in BlockLogFormatter allows XSS in the partial blocks feature." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-15T20:06:46.235267", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T332889" }, { "url": "https://www.mediawiki.org/wiki/Release_notes/1.40#Other_changes_in_1.40" }, { "name": "DSA-5447", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2023/dsa-5447" }, { "name": "FEDORA-2023-1fcaba0998", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DOAXEGYBOEM4JWB4J3BDH73NK2LCYC3O/" }, { "name": "FEDORA-2023-d8ae3c122e", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UIVGYECQGTUC2LLPVCZBPDLCTOHL2F6/" }, { "name": "FEDORA-2023-7e9d6015f6", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CHRX6DSLAMVXCV2YMJEWOLTBEYSESE5/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-36675", "datePublished": "2023-06-26T00:00:00", "dateReserved": "2023-06-26T00:00:00", "dateUpdated": "2024-12-05T15:25:03.755Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-29004
Vulnerability from cvelistv5
Published
2021-01-29 06:22
Modified
2024-08-04 16:48
Severity ?
EPSS score ?
Summary
The API in the Push extension for MediaWiki through 1.35 did not require an edit token in ApiPushBase.php and therefore facilitated a CSRF attack.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T262724 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Push/+/625988 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Push/+/625988/10/src/api/ApiPushBase.php | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:48:01.320Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T262724" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Push/+/625988" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Push/+/625988/10/src/api/ApiPushBase.php" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The API in the Push extension for MediaWiki through 1.35 did not require an edit token in ApiPushBase.php and therefore facilitated a CSRF attack." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-29T06:22:51", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T262724" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Push/+/625988" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Push/+/625988/10/src/api/ApiPushBase.php" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-29004", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The API in the Push extension for MediaWiki through 1.35 did not require an edit token in ApiPushBase.php and therefore facilitated a CSRF attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T262724", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T262724" }, { "name": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Push/+/625988", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Push/+/625988" }, { "name": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Push/+/625988/10/src/api/ApiPushBase.php", "refsource": "CONFIRM", "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Push/+/625988/10/src/api/ApiPushBase.php" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-29004", "datePublished": "2021-01-29T06:22:51", "dateReserved": "2020-11-24T00:00:00", "dateUpdated": "2024-08-04T16:48:01.320Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46149
Vulnerability from cvelistv5
Published
2022-01-07 05:53
Modified
2024-08-04 05:02
Severity ?
EPSS score ?
Summary
An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. A denial of service (resource consumption) can be accomplished by searching for a very long key in a Language Name Search.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T293749 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/Ide32704cca578b9aecbce34bdcc0ac25c2a09a4d | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:02:10.339Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T293749" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/Ide32704cca578b9aecbce34bdcc0ac25c2a09a4d" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. A denial of service (resource consumption) can be accomplished by searching for a very long key in a Language Name Search." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T05:53:47", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T293749" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/Ide32704cca578b9aecbce34bdcc0ac25c2a09a4d" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-46149", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. A denial of service (resource consumption) can be accomplished by searching for a very long key in a Language Name Search." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T293749", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T293749" }, { "name": "https://gerrit.wikimedia.org/r/q/Ide32704cca578b9aecbce34bdcc0ac25c2a09a4d", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/Ide32704cca578b9aecbce34bdcc0ac25c2a09a4d" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-46149", "datePublished": "2022-01-07T05:53:47", "dateReserved": "2022-01-07T00:00:00", "dateUpdated": "2024-08-04T05:02:10.339Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-4574
Vulnerability from cvelistv5
Published
2014-05-12 14:00
Modified
2024-08-06 16:45
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in the TimeMediaHandler extension for MediaWiki before 1.19.10, 1.2x before 1.21.4, and 1.22.x before 1.22.1 allows remote attackers to inject arbitrary web script or HTML via vectors related to videos.
References
▼ | URL | Tags |
---|---|---|
http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000138.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:45:14.842Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[MediaWiki-announce] 20140114 MediaWiki Security Releases: 1.22.1, 1.21.4 and 1.19.10", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000138.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-01-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the TimeMediaHandler extension for MediaWiki before 1.19.10, 1.2x before 1.21.4, and 1.22.x before 1.22.1 allows remote attackers to inject arbitrary web script or HTML via vectors related to videos." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-05-12T13:57:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[MediaWiki-announce] 20140114 MediaWiki Security Releases: 1.22.1, 1.21.4 and 1.19.10", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000138.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4574", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the TimeMediaHandler extension for MediaWiki before 1.19.10, 1.2x before 1.21.4, and 1.22.x before 1.22.1 allows remote attackers to inject arbitrary web script or HTML via vectors related to videos." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[MediaWiki-announce] 20140114 MediaWiki Security Releases: 1.22.1, 1.21.4 and 1.19.10", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000138.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-4574", "datePublished": "2014-05-12T14:00:00", "dateReserved": "2013-06-12T00:00:00", "dateUpdated": "2024-08-06T16:45:14.842Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-6733
Vulnerability from cvelistv5
Published
2015-09-01 14:00
Modified
2024-08-06 07:29
Severity ?
EPSS score ?
Summary
GeSHi, as used in the SyntaxHighlight_GeSHi extension and MediaWiki before 1.23.10, 1.24.x before 1.24.3, and 1.25.x before 1.25.2, allows remote attackers to cause a denial of service (resource consumption) via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
https://security.gentoo.org/glsa/201510-05 | vendor-advisory, x_refsource_GENTOO | |
http://www.openwall.com/lists/oss-security/2015/08/27/6 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2015/08/12/6 | mailing-list, x_refsource_MLIST | |
https://phabricator.wikimedia.org/T101608 | x_refsource_CONFIRM | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-August/000179.html | mailing-list, x_refsource_MLIST | |
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165193.html | vendor-advisory, x_refsource_FEDORA | |
http://www.securityfocus.com/bid/76361 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:29:24.872Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201510-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201510-05" }, { "name": "[oss-security] 20150827 Re: CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/08/27/6" }, { "name": "[oss-security] 20150812 CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/08/12/6" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T101608" }, { "name": "[MediaWiki-announce] 20150810 MediaWiki Security and Maintenance Releases: 1.25.2, 1.24.3, 1.23.10", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-August/000179.html" }, { "name": "FEDORA-2015-13920", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165193.html" }, { "name": "76361", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/76361" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-08-10T00:00:00", "descriptions": [ { "lang": "en", "value": "GeSHi, as used in the SyntaxHighlight_GeSHi extension and MediaWiki before 1.23.10, 1.24.x before 1.24.3, and 1.25.x before 1.25.2, allows remote attackers to cause a denial of service (resource consumption) via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-05T21:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "GLSA-201510-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201510-05" }, { "name": "[oss-security] 20150827 Re: CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/08/27/6" }, { "name": "[oss-security] 20150812 CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/08/12/6" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T101608" }, { "name": "[MediaWiki-announce] 20150810 MediaWiki Security and Maintenance Releases: 1.25.2, 1.24.3, 1.23.10", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-August/000179.html" }, { "name": "FEDORA-2015-13920", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165193.html" }, { "name": "76361", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/76361" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-6733", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GeSHi, as used in the SyntaxHighlight_GeSHi extension and MediaWiki before 1.23.10, 1.24.x before 1.24.3, and 1.25.x before 1.25.2, allows remote attackers to cause a denial of service (resource consumption) via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201510-05", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201510-05" }, { "name": "[oss-security] 20150827 Re: CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/08/27/6" }, { "name": "[oss-security] 20150812 CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/08/12/6" }, { "name": "https://phabricator.wikimedia.org/T101608", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T101608" }, { "name": "[MediaWiki-announce] 20150810 MediaWiki Security and Maintenance Releases: 1.25.2, 1.24.3, 1.23.10", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-August/000179.html" }, { "name": "FEDORA-2015-13920", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165193.html" }, { "name": "76361", "refsource": "BID", "url": "http://www.securityfocus.com/bid/76361" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-6733", "datePublished": "2015-09-01T14:00:00", "dateReserved": "2015-08-27T00:00:00", "dateUpdated": "2024-08-06T07:29:24.872Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-5242
Vulnerability from cvelistv5
Published
2014-08-22 17:00
Modified
2024-08-06 11:41
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in mediawiki.page.image.pagination.js in MediaWiki 1.22.x before 1.22.9 and 1.23.x before 1.23.2 allows remote attackers to inject arbitrary web script or HTML via vectors involving the multipageimagenavbox class in conjunction with an action=raw value.
References
▼ | URL | Tags |
---|---|---|
https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-July/000157.html | mailing-list, x_refsource_MLIST | |
https://bugzilla.wikimedia.org/show_bug.cgi?id=66608 | x_refsource_CONFIRM | |
http://www.mandriva.com/security/advisories?name=MDVSA-2014:153 | vendor-advisory, x_refsource_MANDRIVA | |
http://www.securityfocus.com/bid/69135 | vdb-entry, x_refsource_BID | |
http://openwall.com/lists/oss-security/2014/08/14/5 | mailing-list, x_refsource_MLIST | |
http://advisories.mageia.org/MGASA-2014-0309.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T11:41:48.075Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[MediaWiki-announce] 20140730 MediaWiki Security and Maintenance Releases: 1.19.18, 1.22.9 and 1.23.2", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-July/000157.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=66608" }, { "name": "MDVSA-2014:153", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:153" }, { "name": "69135", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/69135" }, { "name": "[oss-security] 20140814 Re: Possible CVE Request: MediaWiki Security and Maintenance Releases: 1.19.18, 1.22.9 and 1.23.2", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2014/08/14/5" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://advisories.mageia.org/MGASA-2014-0309.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-08-01T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in mediawiki.page.image.pagination.js in MediaWiki 1.22.x before 1.22.9 and 1.23.x before 1.23.2 allows remote attackers to inject arbitrary web script or HTML via vectors involving the multipageimagenavbox class in conjunction with an action=raw value." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-04-29T18:57:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[MediaWiki-announce] 20140730 MediaWiki Security and Maintenance Releases: 1.19.18, 1.22.9 and 1.23.2", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-July/000157.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=66608" }, { "name": "MDVSA-2014:153", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:153" }, { "name": "69135", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/69135" }, { "name": "[oss-security] 20140814 Re: Possible CVE Request: MediaWiki Security and Maintenance Releases: 1.19.18, 1.22.9 and 1.23.2", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2014/08/14/5" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://advisories.mageia.org/MGASA-2014-0309.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-5242", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in mediawiki.page.image.pagination.js in MediaWiki 1.22.x before 1.22.9 and 1.23.x before 1.23.2 allows remote attackers to inject arbitrary web script or HTML via vectors involving the multipageimagenavbox class in conjunction with an action=raw value." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[MediaWiki-announce] 20140730 MediaWiki Security and Maintenance Releases: 1.19.18, 1.22.9 and 1.23.2", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-July/000157.html" }, { "name": "https://bugzilla.wikimedia.org/show_bug.cgi?id=66608", "refsource": "CONFIRM", "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=66608" }, { "name": "MDVSA-2014:153", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:153" }, { "name": "69135", "refsource": "BID", "url": "http://www.securityfocus.com/bid/69135" }, { "name": "[oss-security] 20140814 Re: Possible CVE Request: MediaWiki Security and Maintenance Releases: 1.19.18, 1.22.9 and 1.23.2", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2014/08/14/5" }, { "name": "http://advisories.mageia.org/MGASA-2014-0309.html", "refsource": "CONFIRM", "url": "http://advisories.mageia.org/MGASA-2014-0309.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-5242", "datePublished": "2014-08-22T17:00:00", "dateReserved": "2014-08-14T00:00:00", "dateUpdated": "2024-08-06T11:41:48.075Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-6334
Vulnerability from cvelistv5
Published
2017-04-20 17:00
Modified
2024-08-06 01:29
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in the Parser::replaceInternalLinks2 method in MediaWiki before 1.23.15, 1.26.x before 1.26.4, and 1.27.x before 1.27.1 allows remote attackers to inject arbitrary web script or HTML via vectors involving replacement of percent encoding in unclosed internal links.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/98057 | vdb-entry, x_refsource_BID | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2016-August/000195.html | mailing-list, x_refsource_MLIST | |
https://bugzilla.redhat.com/show_bug.cgi?id=1369613 | x_refsource_CONFIRM | |
https://phabricator.wikimedia.org/T137264 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:29:19.371Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "98057", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/98057" }, { "name": "[MediaWiki-announce] 20160823 Security Release - 1.27.1, 1.26.4, 1.23.15", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2016-August/000195.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369613" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T137264" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-08-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the Parser::replaceInternalLinks2 method in MediaWiki before 1.23.15, 1.26.x before 1.26.4, and 1.27.x before 1.27.1 allows remote attackers to inject arbitrary web script or HTML via vectors involving replacement of percent encoding in unclosed internal links." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-04-28T09:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "98057", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/98057" }, { "name": "[MediaWiki-announce] 20160823 Security Release - 1.27.1, 1.26.4, 1.23.15", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2016-August/000195.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369613" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T137264" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-6334", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the Parser::replaceInternalLinks2 method in MediaWiki before 1.23.15, 1.26.x before 1.26.4, and 1.27.x before 1.27.1 allows remote attackers to inject arbitrary web script or HTML via vectors involving replacement of percent encoding in unclosed internal links." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "98057", "refsource": "BID", "url": "http://www.securityfocus.com/bid/98057" }, { "name": "[MediaWiki-announce] 20160823 Security Release - 1.27.1, 1.26.4, 1.23.15", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2016-August/000195.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1369613", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369613" }, { "name": "https://phabricator.wikimedia.org/T137264", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T137264" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-6334", "datePublished": "2017-04-20T17:00:00", "dateReserved": "2016-07-26T00:00:00", "dateUpdated": "2024-08-06T01:29:19.371Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-35474
Vulnerability from cvelistv5
Published
2020-12-18 07:30
Modified
2024-08-04 17:02
Severity ?
EPSS score ?
Summary
In MediaWiki before 1.35.1, the combination of Html::rawElement and Message::text leads to XSS because the definition of MediaWiki:recentchanges-legend-watchlistexpiry can be changed onwiki so that the output is raw HTML.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T268894 | x_refsource_MISC | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2020-December/000268.html | x_refsource_MISC | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STT5Z4A3BCXVH3WIPICWU2FP4IPIMUPC/ | vendor-advisory, x_refsource_FEDORA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:02:08.056Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T268894" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2020-December/000268.html" }, { "name": "FEDORA-2020-0be2d40e13", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STT5Z4A3BCXVH3WIPICWU2FP4IPIMUPC/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In MediaWiki before 1.35.1, the combination of Html::rawElement and Message::text leads to XSS because the definition of MediaWiki:recentchanges-legend-watchlistexpiry can be changed onwiki so that the output is raw HTML." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-27T03:06:13", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T268894" }, { "tags": [ "x_refsource_MISC" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2020-December/000268.html" }, { "name": "FEDORA-2020-0be2d40e13", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STT5Z4A3BCXVH3WIPICWU2FP4IPIMUPC/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-35474", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In MediaWiki before 1.35.1, the combination of Html::rawElement and Message::text leads to XSS because the definition of MediaWiki:recentchanges-legend-watchlistexpiry can be changed onwiki so that the output is raw HTML." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T268894", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T268894" }, { "name": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2020-December/000268.html", "refsource": "MISC", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2020-December/000268.html" }, { "name": "FEDORA-2020-0be2d40e13", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STT5Z4A3BCXVH3WIPICWU2FP4IPIMUPC/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-35474", "datePublished": "2020-12-18T07:30:48", "dateReserved": "2020-12-16T00:00:00", "dateUpdated": "2024-08-04T17:02:08.056Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-45472
Vulnerability from cvelistv5
Published
2021-12-24 01:04
Modified
2024-08-04 04:39
Severity ?
EPSS score ?
Summary
In MediaWiki through 1.37, XSS can occur in Wikibase because an external identifier property can have a URL format that includes a $1 formatter substitution marker, and the javascript: URL scheme (among others) can be used.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T297570 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/I37ece1dfdc80d38055067c9c4fa73ba591acd8bd | x_refsource_MISC | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7JNQA53K675TQBBJPZRAG5ZT6XES3IS/ | vendor-advisory, x_refsource_FEDORA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:39:21.063Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T297570" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/I37ece1dfdc80d38055067c9c4fa73ba591acd8bd" }, { "name": "FEDORA-2021-bef1126908", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7JNQA53K675TQBBJPZRAG5ZT6XES3IS/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In MediaWiki through 1.37, XSS can occur in Wikibase because an external identifier property can have a URL format that includes a $1 formatter substitution marker, and the javascript: URL scheme (among others) can be used." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-08T02:06:16", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T297570" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/I37ece1dfdc80d38055067c9c4fa73ba591acd8bd" }, { "name": "FEDORA-2021-bef1126908", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7JNQA53K675TQBBJPZRAG5ZT6XES3IS/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-45472", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In MediaWiki through 1.37, XSS can occur in Wikibase because an external identifier property can have a URL format that includes a $1 formatter substitution marker, and the javascript: URL scheme (among others) can be used." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T297570", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T297570" }, { "name": "https://gerrit.wikimedia.org/r/q/I37ece1dfdc80d38055067c9c4fa73ba591acd8bd", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/I37ece1dfdc80d38055067c9c4fa73ba591acd8bd" }, { "name": "FEDORA-2021-bef1126908", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7JNQA53K675TQBBJPZRAG5ZT6XES3IS/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-45472", "datePublished": "2021-12-24T01:04:04", "dateReserved": "2021-12-24T00:00:00", "dateUpdated": "2024-08-04T04:39:21.063Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-40599
Vulnerability from cvelistv5
Published
2024-07-06 00:00
Modified
2024-08-02 04:33
Severity ?
EPSS score ?
Summary
An issue was discovered in the GuMaxDD skin for MediaWiki through 1.42.1. There is stored XSS via MediaWiki:Sidebar top-level menu entries.
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-40599", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-22T17:50:19.904197Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-22T17:50:39.821Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T04:33:11.731Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T361448" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the GuMaxDD skin for MediaWiki through 1.42.1. There is stored XSS via MediaWiki:Sidebar top-level menu entries." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-06T23:26:21.269053", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T361448" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-40599", "datePublished": "2024-07-06T00:00:00", "dateReserved": "2024-07-06T00:00:00", "dateUpdated": "2024-08-02T04:33:11.731Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-4568
Vulnerability from cvelistv5
Published
2013-12-13 18:00
Modified
2024-08-06 16:45
Severity ?
EPSS score ?
Summary
Incomplete blacklist vulnerability in Sanitizer::checkCss in MediaWiki before 1.19.9, 1.20.x before 1.20.8, and 1.21.x before 1.21.3 allows remote attackers to conduct cross-site scripting (XSS) attacks via certain non-ASCII characters in CSS, as demonstrated using variations of "expression" containing (1) full width characters or (2) IPA extensions, which are converted and rendered by Internet Explorer.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/57472 | third-party-advisory, x_refsource_SECUNIA | |
http://www.debian.org/security/2014/dsa-2891 | vendor-advisory, x_refsource_DEBIAN | |
https://bugzilla.wikimedia.org/attachment.cgi?id=13452&action=diff | x_refsource_MISC | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-November/000135.html | mailing-list, x_refsource_MLIST | |
http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123011.html | vendor-advisory, x_refsource_FEDORA | |
http://www.securityfocus.com/bid/63761 | vdb-entry, x_refsource_BID | |
http://lists.fedoraproject.org/pipermail/package-announce/2013-December/122998.html | vendor-advisory, x_refsource_FEDORA | |
https://bugzilla.wikimedia.org/show_bug.cgi?id=55332 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:45:14.820Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "57472", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/57472" }, { "name": "DSA-2891", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-2891" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/attachment.cgi?id=13452\u0026action=diff" }, { "name": "[MediaWiki-announce] 20131114 MediaWiki Security Release: 1.21.3, 1.20.8 and 1.19.9", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-November/000135.html" }, { "name": "FEDORA-2013-21856", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123011.html" }, { "name": "63761", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/63761" }, { "name": "FEDORA-2013-21874", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/122998.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=55332" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-10-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Incomplete blacklist vulnerability in Sanitizer::checkCss in MediaWiki before 1.19.9, 1.20.x before 1.20.8, and 1.21.x before 1.21.3 allows remote attackers to conduct cross-site scripting (XSS) attacks via certain non-ASCII characters in CSS, as demonstrated using variations of \"expression\" containing (1) full width characters or (2) IPA extensions, which are converted and rendered by Internet Explorer." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-29T18:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "57472", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/57472" }, { "name": "DSA-2891", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-2891" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.wikimedia.org/attachment.cgi?id=13452\u0026action=diff" }, { "name": "[MediaWiki-announce] 20131114 MediaWiki Security Release: 1.21.3, 1.20.8 and 1.19.9", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-November/000135.html" }, { "name": "FEDORA-2013-21856", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123011.html" }, { "name": "63761", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/63761" }, { "name": "FEDORA-2013-21874", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/122998.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=55332" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4568", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Incomplete blacklist vulnerability in Sanitizer::checkCss in MediaWiki before 1.19.9, 1.20.x before 1.20.8, and 1.21.x before 1.21.3 allows remote attackers to conduct cross-site scripting (XSS) attacks via certain non-ASCII characters in CSS, as demonstrated using variations of \"expression\" containing (1) full width characters or (2) IPA extensions, which are converted and rendered by Internet Explorer." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "57472", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/57472" }, { "name": "DSA-2891", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-2891" }, { "name": "https://bugzilla.wikimedia.org/attachment.cgi?id=13452\u0026action=diff", "refsource": "MISC", "url": "https://bugzilla.wikimedia.org/attachment.cgi?id=13452\u0026action=diff" }, { "name": "[MediaWiki-announce] 20131114 MediaWiki Security Release: 1.21.3, 1.20.8 and 1.19.9", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-November/000135.html" }, { "name": "FEDORA-2013-21856", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123011.html" }, { "name": "63761", "refsource": "BID", "url": "http://www.securityfocus.com/bid/63761" }, { "name": "FEDORA-2013-21874", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/122998.html" }, { "name": "https://bugzilla.wikimedia.org/show_bug.cgi?id=55332", "refsource": "CONFIRM", "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=55332" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-4568", "datePublished": "2013-12-13T18:00:00", "dateReserved": "2013-06-12T00:00:00", "dateUpdated": "2024-08-06T16:45:14.820Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-0370
Vulnerability from cvelistv5
Published
2018-04-13 16:00
Modified
2024-09-16 17:02
Severity ?
EPSS score ?
Summary
Mediawiki before 1.28.1 / 1.27.2 / 1.23.16 contains a flaw were Spam blacklist is ineffective on encoded URLs inside file inclusion syntax's link parameter.
References
▼ | URL | Tags |
---|---|---|
https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html | mailing-list, x_refsource_MLIST | |
https://security-tracker.debian.org/tracker/CVE-2017-0370 | x_refsource_CONFIRM | |
https://phabricator.wikimedia.org/T48143 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T13:03:57.076Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[mediawiki-announce] 20170406 Security Release: 1.28.1 / 1.27.2 / 1.23.16", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security-tracker.debian.org/tracker/CVE-2017-0370" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T48143" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "mediawiki", "vendor": "mediawiki", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-04-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Mediawiki before 1.28.1 / 1.27.2 / 1.23.16 contains a flaw were Spam blacklist is ineffective on encoded URLs inside file inclusion syntax\u0027s link parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "blacklist ineffective on certain URLs", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-04-13T15:57:01", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "name": "[mediawiki-announce] 20170406 Security Release: 1.28.1 / 1.27.2 / 1.23.16", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security-tracker.debian.org/tracker/CVE-2017-0370" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T48143" } ], "source": { "advisory": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html", "discovery": "UNKNOWN" }, "title": "Spam blacklist ineffective on encoded URLs inside file inclusion syntax\u0027s link parameter", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "DATE_PUBLIC": "2017-04-06T20:49:19.000Z", "ID": "CVE-2017-0370", "STATE": "PUBLIC", "TITLE": "Spam blacklist ineffective on encoded URLs inside file inclusion syntax\u0027s link parameter" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "mediawiki", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "mediawiki" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Mediawiki before 1.28.1 / 1.27.2 / 1.23.16 contains a flaw were Spam blacklist is ineffective on encoded URLs inside file inclusion syntax\u0027s link parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "blacklist ineffective on certain URLs" } ] } ] }, "references": { "reference_data": [ { "name": "[mediawiki-announce] 20170406 Security Release: 1.28.1 / 1.27.2 / 1.23.16", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html" }, { "name": "https://security-tracker.debian.org/tracker/CVE-2017-0370", "refsource": "CONFIRM", "url": "https://security-tracker.debian.org/tracker/CVE-2017-0370" }, { "name": "https://phabricator.wikimedia.org/T48143", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T48143" } ] }, "source": { "advisory": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2017-0370", "datePublished": "2018-04-13T16:00:00Z", "dateReserved": "2016-11-29T00:00:00", "dateUpdated": "2024-09-16T17:02:56.884Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-6730
Vulnerability from cvelistv5
Published
2015-09-01 14:00
Modified
2024-08-06 07:29
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in thumb.php in MediaWiki before 1.23.10, 1.24.x before 1.24.3, and 1.25.x before 1.25.2 allows remote attackers to inject arbitrary web script or HTML via the f parameter, which is not properly handled in an error page, related to "ForeignAPI images."
References
▼ | URL | Tags |
---|---|---|
https://security.gentoo.org/glsa/201510-05 | vendor-advisory, x_refsource_GENTOO | |
http://www.openwall.com/lists/oss-security/2015/08/27/6 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2015/08/12/6 | mailing-list, x_refsource_MLIST | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-August/000179.html | mailing-list, x_refsource_MLIST | |
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165193.html | vendor-advisory, x_refsource_FEDORA | |
http://www.securityfocus.com/bid/76334 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:29:24.585Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201510-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201510-05" }, { "name": "[oss-security] 20150827 Re: CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/08/27/6" }, { "name": "[oss-security] 20150812 CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/08/12/6" }, { "name": "[MediaWiki-announce] 20150810 MediaWiki Security and Maintenance Releases: 1.25.2, 1.24.3, 1.23.10", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-August/000179.html" }, { "name": "FEDORA-2015-13920", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165193.html" }, { "name": "76334", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/76334" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-08-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in thumb.php in MediaWiki before 1.23.10, 1.24.x before 1.24.3, and 1.25.x before 1.25.2 allows remote attackers to inject arbitrary web script or HTML via the f parameter, which is not properly handled in an error page, related to \"ForeignAPI images.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-05T21:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "GLSA-201510-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201510-05" }, { "name": "[oss-security] 20150827 Re: CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/08/27/6" }, { "name": "[oss-security] 20150812 CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/08/12/6" }, { "name": "[MediaWiki-announce] 20150810 MediaWiki Security and Maintenance Releases: 1.25.2, 1.24.3, 1.23.10", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-August/000179.html" }, { "name": "FEDORA-2015-13920", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165193.html" }, { "name": "76334", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/76334" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-6730", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in thumb.php in MediaWiki before 1.23.10, 1.24.x before 1.24.3, and 1.25.x before 1.25.2 allows remote attackers to inject arbitrary web script or HTML via the f parameter, which is not properly handled in an error page, related to \"ForeignAPI images.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201510-05", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201510-05" }, { "name": "[oss-security] 20150827 Re: CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/08/27/6" }, { "name": "[oss-security] 20150812 CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/08/12/6" }, { "name": "[MediaWiki-announce] 20150810 MediaWiki Security and Maintenance Releases: 1.25.2, 1.24.3, 1.23.10", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-August/000179.html" }, { "name": "FEDORA-2015-13920", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165193.html" }, { "name": "76334", "refsource": "BID", "url": "http://www.securityfocus.com/bid/76334" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-6730", "datePublished": "2015-09-01T14:00:00", "dateReserved": "2015-08-27T00:00:00", "dateUpdated": "2024-08-06T07:29:24.585Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-29139
Vulnerability from cvelistv5
Published
2023-03-31 00:00
Modified
2024-08-02 14:00
Severity ?
EPSS score ?
Summary
An issue was discovered in the CheckUser extension for MediaWiki through 1.39.3. When a user with checkuserlog permissions makes many CheckUserLog API requests in some configurations, denial of service can occur (RequestTimeoutException or upstream request timeout).
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T14:00:15.500Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T326293" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the CheckUser extension for MediaWiki through 1.39.3. When a user with checkuserlog permissions makes many CheckUserLog API requests in some configurations, denial of service can occur (RequestTimeoutException or upstream request timeout)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-31T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T326293" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-29139", "datePublished": "2023-03-31T00:00:00", "dateReserved": "2023-03-31T00:00:00", "dateUpdated": "2024-08-02T14:00:15.500Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-1190
Vulnerability from cvelistv5
Published
2010-03-31 17:35
Modified
2024-08-07 01:14
Severity ?
EPSS score ?
Summary
thumb.php in MediaWiki before 1.15.2, when used with access-restriction mechanisms such as img_auth.php, does not check user permissions before providing scaled images, which allows remote attackers to bypass intended access restrictions and read private images via unspecified manipulations.
References
▼ | URL | Tags |
---|---|---|
http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_15_2/phase3/RELEASE-NOTES | x_refsource_CONFIRM | |
http://secunia.com/advisories/39656 | third-party-advisory, x_refsource_SECUNIA | |
http://www.debian.org/security/2010/dsa-2022 | vendor-advisory, x_refsource_DEBIAN | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2010-March/000088.html | mailing-list, x_refsource_MLIST | |
http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html | vendor-advisory, x_refsource_SUSE | |
http://www.vupen.com/english/advisories/2010/0685 | vdb-entry, x_refsource_VUPEN | |
http://secunia.com/advisories/39022 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2010/1001 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:14:06.640Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_15_2/phase3/RELEASE-NOTES" }, { "name": "39656", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/39656" }, { "name": "DSA-2022", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2010/dsa-2022" }, { "name": "[MediaWiki-announce] 20100303 MediaWiki security update: 1.15.2", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2010-March/000088.html" }, { "name": "SUSE-SR:2010:010", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html" }, { "name": "ADV-2010-0685", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/0685" }, { "name": "39022", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/39022" }, { "name": "ADV-2010-1001", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1001" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-03-03T00:00:00", "descriptions": [ { "lang": "en", "value": "thumb.php in MediaWiki before 1.15.2, when used with access-restriction mechanisms such as img_auth.php, does not check user permissions before providing scaled images, which allows remote attackers to bypass intended access restrictions and read private images via unspecified manipulations." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-04-30T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_15_2/phase3/RELEASE-NOTES" }, { "name": "39656", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/39656" }, { "name": "DSA-2022", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2010/dsa-2022" }, { "name": "[MediaWiki-announce] 20100303 MediaWiki security update: 1.15.2", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2010-March/000088.html" }, { "name": "SUSE-SR:2010:010", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html" }, { "name": "ADV-2010-0685", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/0685" }, { "name": "39022", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/39022" }, { "name": "ADV-2010-1001", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1001" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-1190", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "thumb.php in MediaWiki before 1.15.2, when used with access-restriction mechanisms such as img_auth.php, does not check user permissions before providing scaled images, which allows remote attackers to bypass intended access restrictions and read private images via unspecified manipulations." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_15_2/phase3/RELEASE-NOTES", "refsource": "CONFIRM", "url": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_15_2/phase3/RELEASE-NOTES" }, { "name": "39656", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/39656" }, { "name": "DSA-2022", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2010/dsa-2022" }, { "name": "[MediaWiki-announce] 20100303 MediaWiki security update: 1.15.2", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2010-March/000088.html" }, { "name": "SUSE-SR:2010:010", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html" }, { "name": "ADV-2010-0685", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/0685" }, { "name": "39022", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/39022" }, { "name": "ADV-2010-1001", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1001" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-1190", "datePublished": "2010-03-31T17:35:00", "dateReserved": "2010-03-30T00:00:00", "dateUpdated": "2024-08-07T01:14:06.640Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-0362
Vulnerability from cvelistv5
Published
2018-04-13 16:00
Modified
2024-09-16 20:22
Severity ?
EPSS score ?
Summary
Mediawiki before 1.28.1 / 1.27.2 / 1.23.16 contains a flaw where the "Mark all pages visited" on the watchlist does not require a CSRF token.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T150044 | x_refsource_CONFIRM | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html | mailing-list, x_refsource_MLIST | |
https://security-tracker.debian.org/tracker/CVE-2017-0362 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T13:03:56.827Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T150044" }, { "name": "[mediawiki-announce] 20170406 Security Release: 1.28.1 / 1.27.2 / 1.23.16", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security-tracker.debian.org/tracker/CVE-2017-0362" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "mediawiki", "vendor": "mediawiki", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-04-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Mediawiki before 1.28.1 / 1.27.2 / 1.23.16 contains a flaw where the \"Mark all pages visited\" on the watchlist does not require a CSRF token." } ], "problemTypes": [ { "descriptions": [ { "description": "missing requirement on token", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-04-13T15:57:01", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T150044" }, { "name": "[mediawiki-announce] 20170406 Security Release: 1.28.1 / 1.27.2 / 1.23.16", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security-tracker.debian.org/tracker/CVE-2017-0362" } ], "source": { "advisory": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html", "discovery": "UNKNOWN" }, "title": "\"Mark all pages visited\" on the watchlist does not require a CSRF token", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "DATE_PUBLIC": "2017-04-06T20:49:19.000Z", "ID": "CVE-2017-0362", "STATE": "PUBLIC", "TITLE": "\"Mark all pages visited\" on the watchlist does not require a CSRF token" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "mediawiki", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "mediawiki" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Mediawiki before 1.28.1 / 1.27.2 / 1.23.16 contains a flaw where the \"Mark all pages visited\" on the watchlist does not require a CSRF token." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "missing requirement on token" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T150044", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T150044" }, { "name": "[mediawiki-announce] 20170406 Security Release: 1.28.1 / 1.27.2 / 1.23.16", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html" }, { "name": "https://security-tracker.debian.org/tracker/CVE-2017-0362", "refsource": "CONFIRM", "url": "https://security-tracker.debian.org/tracker/CVE-2017-0362" } ] }, "source": { "advisory": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2017-0362", "datePublished": "2018-04-13T16:00:00Z", "dateReserved": "2016-11-29T00:00:00", "dateUpdated": "2024-09-16T20:22:32.537Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-41801
Vulnerability from cvelistv5
Published
2021-10-11 07:40
Modified
2024-08-04 03:22
Severity ?
EPSS score ?
Summary
The ReplaceText extension through 1.41 for MediaWiki has Incorrect Access Control. When a user is blocked after submitting a replace job, the job is still run, even if it may be run at a later time (due to the job queue backlog)
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T279090 | x_refsource_MISC | |
https://lists.wikimedia.org/hyperkitty/list/wikitech-l%40lists.wikimedia.org/thread/2IFS5CM2YV4VMSODPX3J2LFHKSEWVFV5/ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:22:24.024Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T279090" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://lists.wikimedia.org/hyperkitty/list/wikitech-l%40lists.wikimedia.org/thread/2IFS5CM2YV4VMSODPX3J2LFHKSEWVFV5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The ReplaceText extension through 1.41 for MediaWiki has Incorrect Access Control. When a user is blocked after submitting a replace job, the job is still run, even if it may be run at a later time (due to the job queue backlog)" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-11T07:40:22", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T279090" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://lists.wikimedia.org/hyperkitty/list/wikitech-l%40lists.wikimedia.org/thread/2IFS5CM2YV4VMSODPX3J2LFHKSEWVFV5/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-41801", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The ReplaceText extension through 1.41 for MediaWiki has Incorrect Access Control. When a user is blocked after submitting a replace job, the job is still run, even if it may be run at a later time (due to the job queue backlog)" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T279090", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T279090" }, { "name": "https://lists.wikimedia.org/hyperkitty/list/wikitech-l@lists.wikimedia.org/thread/2IFS5CM2YV4VMSODPX3J2LFHKSEWVFV5/", "refsource": "CONFIRM", "url": "https://lists.wikimedia.org/hyperkitty/list/wikitech-l@lists.wikimedia.org/thread/2IFS5CM2YV4VMSODPX3J2LFHKSEWVFV5/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-41801", "datePublished": "2021-10-11T07:40:22", "dateReserved": "2021-09-29T00:00:00", "dateUpdated": "2024-08-04T03:22:24.024Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36129
Vulnerability from cvelistv5
Published
2021-07-02 13:00
Modified
2024-08-04 00:47
Severity ?
EPSS score ?
Summary
An issue was discovered in the Translate extension in MediaWiki through 1.36. The Aggregategroups Action API module does not validate the parameter for aggregategroup when action=remove is set, thus allowing users with the translate-manage right to silently delete various groups' metadata.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T282932 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/I3619a7e88c2eb979babb7b027d4fdbfabc0af792 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:47:43.803Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T282932" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/I3619a7e88c2eb979babb7b027d4fdbfabc0af792" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the Translate extension in MediaWiki through 1.36. The Aggregategroups Action API module does not validate the parameter for aggregategroup when action=remove is set, thus allowing users with the translate-manage right to silently delete various groups\u0027 metadata." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-02T13:00:38", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T282932" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/I3619a7e88c2eb979babb7b027d4fdbfabc0af792" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-36129", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in the Translate extension in MediaWiki through 1.36. The Aggregategroups Action API module does not validate the parameter for aggregategroup when action=remove is set, thus allowing users with the translate-manage right to silently delete various groups\u0027 metadata." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T282932", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T282932" }, { "name": "https://gerrit.wikimedia.org/r/q/I3619a7e88c2eb979babb7b027d4fdbfabc0af792", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/I3619a7e88c2eb979babb7b027d4fdbfabc0af792" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-36129", "datePublished": "2021-07-02T13:00:38", "dateReserved": "2021-07-02T00:00:00", "dateUpdated": "2024-08-04T00:47:43.803Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-4379
Vulnerability from cvelistv5
Published
2017-10-19 21:00
Modified
2024-08-06 20:35
Severity ?
EPSS score ?
Summary
MediaWiki before 1.18.5, and 1.19.x before 1.19.2 does not send a restrictive X-Frame-Options HTTP header, which allows remote attackers to conduct clickjacking attacks via an embedded API response in an IFRAME element.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T41180 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2012/08/31/6 | mailing-list, x_refsource_MLIST | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2012-August/000119.html | mailing-list, x_refsource_MLIST | |
https://bugzilla.redhat.com/show_bug.cgi?id=853426 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2012/08/31/10 | mailing-list, x_refsource_MLIST | |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:35:09.330Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T41180" }, { "name": "[oss-security] 20120831 CVE Request -- MediaWiki 1.19.2 and 1.18.5 multiple security flaws", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/08/31/6" }, { "name": "[MediaWiki-announce] 20120831 MediaWiki security release: 1.19.2 and 1.18.5", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2012-August/000119.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853426" }, { "name": "[oss-security] 20120831 Re: CVE Request -- MediaWiki 1.19.2 and 1.18.5 multiple security flaws", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/08/31/10" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-08-31T00:00:00", "descriptions": [ { "lang": "en", "value": "MediaWiki before 1.18.5, and 1.19.x before 1.19.2 does not send a restrictive X-Frame-Options HTTP header, which allows remote attackers to conduct clickjacking attacks via an embedded API response in an IFRAME element." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-19T20:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T41180" }, { "name": "[oss-security] 20120831 CVE Request -- MediaWiki 1.19.2 and 1.18.5 multiple security flaws", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/08/31/6" }, { "name": "[MediaWiki-announce] 20120831 MediaWiki security release: 1.19.2 and 1.18.5", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2012-August/000119.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853426" }, { "name": "[oss-security] 20120831 Re: CVE Request -- MediaWiki 1.19.2 and 1.18.5 multiple security flaws", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/08/31/10" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-4379", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MediaWiki before 1.18.5, and 1.19.x before 1.19.2 does not send a restrictive X-Frame-Options HTTP header, which allows remote attackers to conduct clickjacking attacks via an embedded API response in an IFRAME element." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T41180", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T41180" }, { "name": "[oss-security] 20120831 CVE Request -- MediaWiki 1.19.2 and 1.18.5 multiple security flaws", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2012/08/31/6" }, { "name": "[MediaWiki-announce] 20120831 MediaWiki security release: 1.19.2 and 1.18.5", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2012-August/000119.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=853426", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853426" }, { "name": "[oss-security] 20120831 Re: CVE Request -- MediaWiki 1.19.2 and 1.18.5 multiple security flaws", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2012/08/31/10" }, { "name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330", "refsource": "MISC", "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-4379", "datePublished": "2017-10-19T21:00:00", "dateReserved": "2012-08-21T00:00:00", "dateUpdated": "2024-08-06T20:35:09.330Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-30154
Vulnerability from cvelistv5
Published
2021-04-06 06:43
Modified
2024-08-03 22:24
Severity ?
EPSS score ?
Summary
An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. On Special:NewFiles, all the mediastatistics-header-* messages are output in HTML unescaped, leading to XSS.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T278014 | x_refsource_MISC | |
https://www.debian.org/security/2021/dsa-4889 | vendor-advisory, x_refsource_DEBIAN | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/26UJGHF7LJDOCQN6A3Z4PM7PYRKENJHE/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2OMSV7B2TCFBOCICN3B4SMQP5HVRJQIT/ | vendor-advisory, x_refsource_FEDORA | |
https://security.gentoo.org/glsa/202107-40 | vendor-advisory, x_refsource_GENTOO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T22:24:59.636Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T278014" }, { "name": "DSA-4889", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2021/dsa-4889" }, { "name": "FEDORA-2021-f4223b6684", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/26UJGHF7LJDOCQN6A3Z4PM7PYRKENJHE/" }, { "name": "FEDORA-2021-d298103d3a", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2OMSV7B2TCFBOCICN3B4SMQP5HVRJQIT/" }, { "name": "GLSA-202107-40", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202107-40" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. On Special:NewFiles, all the mediastatistics-header-* messages are output in HTML unescaped, leading to XSS." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-17T07:06:36", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T278014" }, { "name": "DSA-4889", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2021/dsa-4889" }, { "name": "FEDORA-2021-f4223b6684", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/26UJGHF7LJDOCQN6A3Z4PM7PYRKENJHE/" }, { "name": "FEDORA-2021-d298103d3a", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2OMSV7B2TCFBOCICN3B4SMQP5HVRJQIT/" }, { "name": "GLSA-202107-40", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202107-40" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-30154", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. On Special:NewFiles, all the mediastatistics-header-* messages are output in HTML unescaped, leading to XSS." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T278014", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T278014" }, { "name": "DSA-4889", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4889" }, { "name": "FEDORA-2021-f4223b6684", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/26UJGHF7LJDOCQN6A3Z4PM7PYRKENJHE/" }, { "name": "FEDORA-2021-d298103d3a", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2OMSV7B2TCFBOCICN3B4SMQP5HVRJQIT/" }, { "name": "GLSA-202107-40", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202107-40" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-30154", "datePublished": "2021-04-06T06:43:51", "dateReserved": "2021-04-06T00:00:00", "dateUpdated": "2024-08-03T22:24:59.636Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-2114
Vulnerability from cvelistv5
Published
2013-11-15 18:16
Modified
2024-09-16 23:41
Severity ?
EPSS score ?
Summary
Unrestricted file upload vulnerability in the chunk upload API in MediaWiki 1.19 through 1.19.6 and 1.20.x before 1.20.6 allows remote attackers to execute arbitrary code by uploading a file with an executable extension.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/55433 | third-party-advisory, x_refsource_SECUNIA | |
http://www.openwall.com/lists/oss-security/2013/05/24/3 | mailing-list, x_refsource_MLIST | |
http://security.gentoo.org/glsa/glsa-201310-21.xml | vendor-advisory, x_refsource_GENTOO | |
https://bugzilla.wikimedia.org/show_bug.cgi?id=48306 | x_refsource_CONFIRM | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-May/000131.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:27:40.685Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "55433", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/55433" }, { "name": "[oss-security] 20130524 Re: CVE request: MediaWiki chunked uploads vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2013/05/24/3" }, { "name": "GLSA-201310-21", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201310-21.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=48306" }, { "name": "[MediaWiki-announce] 20130521 MediaWiki Security Release: 1.20.6 and 1.19.7", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-May/000131.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Unrestricted file upload vulnerability in the chunk upload API in MediaWiki 1.19 through 1.19.6 and 1.20.x before 1.20.6 allows remote attackers to execute arbitrary code by uploading a file with an executable extension." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-11-15T18:16:00Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "55433", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/55433" }, { "name": "[oss-security] 20130524 Re: CVE request: MediaWiki chunked uploads vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2013/05/24/3" }, { "name": "GLSA-201310-21", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201310-21.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=48306" }, { "name": "[MediaWiki-announce] 20130521 MediaWiki Security Release: 1.20.6 and 1.19.7", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-May/000131.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-2114", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unrestricted file upload vulnerability in the chunk upload API in MediaWiki 1.19 through 1.19.6 and 1.20.x before 1.20.6 allows remote attackers to execute arbitrary code by uploading a file with an executable extension." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "55433", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/55433" }, { "name": "[oss-security] 20130524 Re: CVE request: MediaWiki chunked uploads vulnerability", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2013/05/24/3" }, { "name": "GLSA-201310-21", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201310-21.xml" }, { "name": "https://bugzilla.wikimedia.org/show_bug.cgi?id=48306", "refsource": "CONFIRM", "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=48306" }, { "name": "[MediaWiki-announce] 20130521 MediaWiki Security Release: 1.20.6 and 1.19.7", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-May/000131.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-2114", "datePublished": "2013-11-15T18:16:00Z", "dateReserved": "2013-02-19T00:00:00Z", "dateUpdated": "2024-09-16T23:41:52.131Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-1189
Vulnerability from cvelistv5
Published
2010-03-31 17:35
Modified
2024-08-07 01:14
Severity ?
EPSS score ?
Summary
MediaWiki before 1.15.2 does not prevent wiki editors from linking to images from other web sites in wiki pages, which allows editors to obtain IP addresses and other information of wiki users by adding a link to an image on an attacker-controlled web site, aka "CSS validation issue."
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/39656 | third-party-advisory, x_refsource_SECUNIA | |
http://www.debian.org/security/2010/dsa-2022 | vendor-advisory, x_refsource_DEBIAN | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2010-March/000088.html | mailing-list, x_refsource_MLIST | |
http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html | vendor-advisory, x_refsource_SUSE | |
http://www.vupen.com/english/advisories/2010/0685 | vdb-entry, x_refsource_VUPEN | |
http://secunia.com/advisories/39022 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2010/1001 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:14:06.657Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "39656", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/39656" }, { "name": "DSA-2022", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2010/dsa-2022" }, { "name": "[MediaWiki-announce] 20100303 MediaWiki security update: 1.15.2", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2010-March/000088.html" }, { "name": "SUSE-SR:2010:010", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html" }, { "name": "ADV-2010-0685", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/0685" }, { "name": "39022", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/39022" }, { "name": "ADV-2010-1001", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1001" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-03-03T00:00:00", "descriptions": [ { "lang": "en", "value": "MediaWiki before 1.15.2 does not prevent wiki editors from linking to images from other web sites in wiki pages, which allows editors to obtain IP addresses and other information of wiki users by adding a link to an image on an attacker-controlled web site, aka \"CSS validation issue.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-04-30T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "39656", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/39656" }, { "name": "DSA-2022", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2010/dsa-2022" }, { "name": "[MediaWiki-announce] 20100303 MediaWiki security update: 1.15.2", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2010-March/000088.html" }, { "name": "SUSE-SR:2010:010", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html" }, { "name": "ADV-2010-0685", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/0685" }, { "name": "39022", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/39022" }, { "name": "ADV-2010-1001", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1001" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-1189", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MediaWiki before 1.15.2 does not prevent wiki editors from linking to images from other web sites in wiki pages, which allows editors to obtain IP addresses and other information of wiki users by adding a link to an image on an attacker-controlled web site, aka \"CSS validation issue.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "39656", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/39656" }, { "name": "DSA-2022", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2010/dsa-2022" }, { "name": "[MediaWiki-announce] 20100303 MediaWiki security update: 1.15.2", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2010-March/000088.html" }, { "name": "SUSE-SR:2010:010", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html" }, { "name": "ADV-2010-0685", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/0685" }, { "name": "39022", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/39022" }, { "name": "ADV-2010-1001", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1001" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-1189", "datePublished": "2010-03-31T17:35:00", "dateReserved": "2010-03-30T00:00:00", "dateUpdated": "2024-08-07T01:14:06.657Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-30159
Vulnerability from cvelistv5
Published
2021-04-09 06:12
Modified
2024-08-03 22:24
Severity ?
EPSS score ?
Summary
An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. Users can bypass intended restrictions on deleting pages in certain "fast double move" situations. MovePage::isValidMoveTarget() uses FOR UPDATE, but it's only called if Title::getArticleID() returns non-zero with no special flags. Next, MovePage::moveToInternal() will delete the page if getArticleID(READ_LATEST) is non-zero. Therefore, if the page is missing in the replica DB, isValidMove() will return true, and then moveToInternal() will unconditionally delete the page if it can be found in the master.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T272386 | x_refsource_MISC | |
https://www.debian.org/security/2021/dsa-4889 | vendor-advisory, x_refsource_DEBIAN | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/26UJGHF7LJDOCQN6A3Z4PM7PYRKENJHE/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2OMSV7B2TCFBOCICN3B4SMQP5HVRJQIT/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.debian.org/debian-lts-announce/2021/05/msg00003.html | mailing-list, x_refsource_MLIST | |
https://lists.debian.org/debian-lts-announce/2021/05/msg00006.html | mailing-list, x_refsource_MLIST | |
https://security.gentoo.org/glsa/202107-40 | vendor-advisory, x_refsource_GENTOO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T22:24:59.632Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T272386" }, { "name": "DSA-4889", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2021/dsa-4889" }, { "name": "FEDORA-2021-f4223b6684", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/26UJGHF7LJDOCQN6A3Z4PM7PYRKENJHE/" }, { "name": "FEDORA-2021-d298103d3a", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2OMSV7B2TCFBOCICN3B4SMQP5HVRJQIT/" }, { "name": "[debian-lts-announce] 20210505 [SECURITY] [DLA 2648-1] mediawiki security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00003.html" }, { "name": "[debian-lts-announce] 20210506 [SECURITY] [DLA 2648-2] mediawiki regression update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00006.html" }, { "name": "GLSA-202107-40", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202107-40" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. Users can bypass intended restrictions on deleting pages in certain \"fast double move\" situations. MovePage::isValidMoveTarget() uses FOR UPDATE, but it\u0027s only called if Title::getArticleID() returns non-zero with no special flags. Next, MovePage::moveToInternal() will delete the page if getArticleID(READ_LATEST) is non-zero. Therefore, if the page is missing in the replica DB, isValidMove() will return true, and then moveToInternal() will unconditionally delete the page if it can be found in the master." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-17T07:06:40", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T272386" }, { "name": "DSA-4889", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2021/dsa-4889" }, { "name": "FEDORA-2021-f4223b6684", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/26UJGHF7LJDOCQN6A3Z4PM7PYRKENJHE/" }, { "name": "FEDORA-2021-d298103d3a", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2OMSV7B2TCFBOCICN3B4SMQP5HVRJQIT/" }, { "name": "[debian-lts-announce] 20210505 [SECURITY] [DLA 2648-1] mediawiki security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00003.html" }, { "name": "[debian-lts-announce] 20210506 [SECURITY] [DLA 2648-2] mediawiki regression update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00006.html" }, { "name": "GLSA-202107-40", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202107-40" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-30159", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. Users can bypass intended restrictions on deleting pages in certain \"fast double move\" situations. MovePage::isValidMoveTarget() uses FOR UPDATE, but it\u0027s only called if Title::getArticleID() returns non-zero with no special flags. Next, MovePage::moveToInternal() will delete the page if getArticleID(READ_LATEST) is non-zero. Therefore, if the page is missing in the replica DB, isValidMove() will return true, and then moveToInternal() will unconditionally delete the page if it can be found in the master." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T272386", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T272386" }, { "name": "DSA-4889", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4889" }, { "name": "FEDORA-2021-f4223b6684", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/26UJGHF7LJDOCQN6A3Z4PM7PYRKENJHE/" }, { "name": "FEDORA-2021-d298103d3a", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2OMSV7B2TCFBOCICN3B4SMQP5HVRJQIT/" }, { "name": "[debian-lts-announce] 20210505 [SECURITY] [DLA 2648-1] mediawiki security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00003.html" }, { "name": "[debian-lts-announce] 20210506 [SECURITY] [DLA 2648-2] mediawiki regression update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00006.html" }, { "name": "GLSA-202107-40", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202107-40" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-30159", "datePublished": "2021-04-09T06:12:55", "dateReserved": "2021-04-06T00:00:00", "dateUpdated": "2024-08-03T22:24:59.632Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-2244
Vulnerability from cvelistv5
Published
2014-03-02 02:00
Modified
2024-08-06 10:06
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in the formatHTML function in includes/api/ApiFormatBase.php in MediaWiki before 1.19.12, 1.20.x and 1.21.x before 1.21.6, and 1.22.x before 1.22.3 allows remote attackers to inject arbitrary web script or HTML via a crafted string located after http:// in the text parameter to api.php.
References
▼ | URL | Tags |
---|---|---|
http://openwall.com/lists/oss-security/2014/02/28/1 | mailing-list, x_refsource_MLIST | |
http://www.securityfocus.com/bid/65906 | vdb-entry, x_refsource_BID | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-February/000141.html | mailing-list, x_refsource_MLIST | |
https://gerrit.wikimedia.org/r/#/q/Idf985e4e69c2f11778a8a90503914678441cb3fb%2Cn%2Cz | x_refsource_CONFIRM | |
https://bugzilla.wikimedia.org/show_bug.cgi?id=61362 | x_refsource_CONFIRM | |
http://openwall.com/lists/oss-security/2014/03/01/2 | mailing-list, x_refsource_MLIST | |
https://bugzilla.redhat.com/show_bug.cgi?id=1071139 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:06:00.222Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20140228 CVE requests: MediaWiki 1.22.3, 1.21.6 and 1.19.12 release", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2014/02/28/1" }, { "name": "65906", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/65906" }, { "name": "[mediawiki-announce] 20140228 MediaWiki Security and Maintenance Releases: 1.22.3, 1.21.6 and 1.19.12", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-February/000141.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/#/q/Idf985e4e69c2f11778a8a90503914678441cb3fb%2Cn%2Cz" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=61362" }, { "name": "[oss-security] 20140301 Re: CVE requests: MediaWiki 1.22.3, 1.21.6 and 1.19.12 release", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2014/03/01/2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1071139" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-02-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the formatHTML function in includes/api/ApiFormatBase.php in MediaWiki before 1.19.12, 1.20.x and 1.21.x before 1.21.6, and 1.22.x before 1.22.3 allows remote attackers to inject arbitrary web script or HTML via a crafted string located after http:// in the text parameter to api.php." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-05-14T16:57:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[oss-security] 20140228 CVE requests: MediaWiki 1.22.3, 1.21.6 and 1.19.12 release", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2014/02/28/1" }, { "name": "65906", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/65906" }, { "name": "[mediawiki-announce] 20140228 MediaWiki Security and Maintenance Releases: 1.22.3, 1.21.6 and 1.19.12", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-February/000141.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://gerrit.wikimedia.org/r/#/q/Idf985e4e69c2f11778a8a90503914678441cb3fb%2Cn%2Cz" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=61362" }, { "name": "[oss-security] 20140301 Re: CVE requests: MediaWiki 1.22.3, 1.21.6 and 1.19.12 release", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2014/03/01/2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1071139" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-2244", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the formatHTML function in includes/api/ApiFormatBase.php in MediaWiki before 1.19.12, 1.20.x and 1.21.x before 1.21.6, and 1.22.x before 1.22.3 allows remote attackers to inject arbitrary web script or HTML via a crafted string located after http:// in the text parameter to api.php." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20140228 CVE requests: MediaWiki 1.22.3, 1.21.6 and 1.19.12 release", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2014/02/28/1" }, { "name": "65906", "refsource": "BID", "url": "http://www.securityfocus.com/bid/65906" }, { "name": "[mediawiki-announce] 20140228 MediaWiki Security and Maintenance Releases: 1.22.3, 1.21.6 and 1.19.12", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-February/000141.html" }, { "name": "https://gerrit.wikimedia.org/r/#/q/Idf985e4e69c2f11778a8a90503914678441cb3fb,n,z", "refsource": "CONFIRM", "url": "https://gerrit.wikimedia.org/r/#/q/Idf985e4e69c2f11778a8a90503914678441cb3fb,n,z" }, { "name": "https://bugzilla.wikimedia.org/show_bug.cgi?id=61362", "refsource": "CONFIRM", "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=61362" }, { "name": "[oss-security] 20140301 Re: CVE requests: MediaWiki 1.22.3, 1.21.6 and 1.19.12 release", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2014/03/01/2" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1071139", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1071139" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-2244", "datePublished": "2014-03-02T02:00:00", "dateReserved": "2014-02-28T00:00:00", "dateUpdated": "2024-08-06T10:06:00.222Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41767
Vulnerability from cvelistv5
Published
2022-12-26 00:00
Modified
2024-08-03 12:49
Severity ?
EPSS score ?
Summary
An issue was discovered in MediaWiki before 1.35.8, 1.36.x and 1.37.x before 1.37.5, and 1.38.x before 1.38.3. When changes made by an IP address are reassigned to a user (using reassignEdits.php), the changes will still be attributed to the IP address on Special:Contributions when doing a range lookup.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:44.052Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T316304" }, { "tags": [ "x_transferred" ], "url": "https://security.gentoo.org/glsa/202305-24" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "unknown", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MediaWiki before 1.35.8, 1.36.x and 1.37.x before 1.37.5, and 1.38.x before 1.38.3. When changes made by an IP address are reassigned to a user (using reassignEdits.php), the changes will still be attributed to the IP address on Special:Contributions when doing a range lookup." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-26T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T316304" }, { "url": "https://security.gentoo.org/glsa/202305-24" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-41767", "datePublished": "2022-12-26T00:00:00", "dateReserved": "2022-09-29T00:00:00", "dateUpdated": "2024-08-03T12:49:44.052Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2005-0534
Vulnerability from cvelistv5
Published
2005-02-24 05:00
Modified
2024-08-07 21:13
Severity ?
EPSS score ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in MediaWiki 1.3.x before 1.3.11 and 1.4 beta before 1.4 rc1 allow remote attackers to inject arbitrary web script.
References
▼ | URL | Tags |
---|---|---|
http://securitytracker.com/id?1013260 | vdb-entry, x_refsource_SECTRACK | |
http://www.gentoo.org/security/en/glsa/glsa-200502-33.xml | vendor-advisory, x_refsource_GENTOO | |
http://sourceforge.net/project/shownotes.php?release_id=307067 | x_refsource_CONFIRM | |
http://secunia.com/advisories/14360 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T21:13:54.286Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1013260", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1013260" }, { "name": "GLSA-200502-33", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200502-33.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sourceforge.net/project/shownotes.php?release_id=307067" }, { "name": "14360", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/14360" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-02-22T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in MediaWiki 1.3.x before 1.3.11 and 1.4 beta before 1.4 rc1 allow remote attackers to inject arbitrary web script." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-03-30T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1013260", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1013260" }, { "name": "GLSA-200502-33", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200502-33.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sourceforge.net/project/shownotes.php?release_id=307067" }, { "name": "14360", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/14360" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-0534", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in MediaWiki 1.3.x before 1.3.11 and 1.4 beta before 1.4 rc1 allow remote attackers to inject arbitrary web script." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1013260", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1013260" }, { "name": "GLSA-200502-33", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200502-33.xml" }, { "name": "http://sourceforge.net/project/shownotes.php?release_id=307067", "refsource": "CONFIRM", "url": "http://sourceforge.net/project/shownotes.php?release_id=307067" }, { "name": "14360", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/14360" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-0534", "datePublished": "2005-02-24T05:00:00", "dateReserved": "2005-02-24T00:00:00", "dateUpdated": "2024-08-07T21:13:54.286Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-2789
Vulnerability from cvelistv5
Published
2011-04-27 00:00
Modified
2024-09-17 02:52
Severity ?
EPSS score ?
Summary
PHP remote file inclusion vulnerability in MediaWikiParserTest.php in MediaWiki 1.16 beta, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://openwall.com/lists/oss-security/2010/07/29/4 | mailing-list, x_refsource_MLIST | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2010-July/000092.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:46:48.439Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20100729 Re: CVE request: mediawiki", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2010/07/29/4" }, { "name": "[mediawiki-announce] 20100728 MediaWiki security release: 1.16.0 and 1.15.5", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2010-July/000092.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "PHP remote file inclusion vulnerability in MediaWikiParserTest.php in MediaWiki 1.16 beta, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-04-27T00:00:00Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[oss-security] 20100729 Re: CVE request: mediawiki", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2010/07/29/4" }, { "name": "[mediawiki-announce] 20100728 MediaWiki security release: 1.16.0 and 1.15.5", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2010-July/000092.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-2789", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "PHP remote file inclusion vulnerability in MediaWikiParserTest.php in MediaWiki 1.16 beta, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20100729 Re: CVE request: mediawiki", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2010/07/29/4" }, { "name": "[mediawiki-announce] 20100728 MediaWiki security release: 1.16.0 and 1.15.5", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2010-July/000092.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2010-2789", "datePublished": "2011-04-27T00:00:00Z", "dateReserved": "2010-07-22T00:00:00Z", "dateUpdated": "2024-09-17T02:52:03.664Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2005-3166
Vulnerability from cvelistv5
Published
2005-10-06 04:00
Modified
2024-08-07 23:01
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in "edit submission handling" for MediaWiki 1.4.x before 1.4.10 and 1.3.x before 1.3.16 allows remote attackers to cause a denial of service (corruption of the previous submission) via a crafted URL.
References
▼ | URL | Tags |
---|---|---|
http://www.novell.com/linux/security/advisories/2005_22_sr.html | vendor-advisory, x_refsource_SUSE | |
http://www.osvdb.org/19956 | vdb-entry, x_refsource_OSVDB | |
http://sourceforge.net/project/shownotes.php?release_id=358163 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T23:01:59.158Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SUSE-SR:2005:022", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2005_22_sr.html" }, { "name": "19956", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/19956" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sourceforge.net/project/shownotes.php?release_id=358163" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-09-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in \"edit submission handling\" for MediaWiki 1.4.x before 1.4.10 and 1.3.x before 1.3.16 allows remote attackers to cause a denial of service (corruption of the previous submission) via a crafted URL." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2006-04-04T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "SUSE-SR:2005:022", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2005_22_sr.html" }, { "name": "19956", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/19956" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sourceforge.net/project/shownotes.php?release_id=358163" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-3166", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in \"edit submission handling\" for MediaWiki 1.4.x before 1.4.10 and 1.3.x before 1.3.16 allows remote attackers to cause a denial of service (corruption of the previous submission) via a crafted URL." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "SUSE-SR:2005:022", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2005_22_sr.html" }, { "name": "19956", "refsource": "OSVDB", "url": "http://www.osvdb.org/19956" }, { "name": "http://sourceforge.net/project/shownotes.php?release_id=358163", "refsource": "CONFIRM", "url": "http://sourceforge.net/project/shownotes.php?release_id=358163" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-3166", "datePublished": "2005-10-06T04:00:00", "dateReserved": "2005-10-06T00:00:00", "dateUpdated": "2024-08-07T23:01:59.158Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-45474
Vulnerability from cvelistv5
Published
2021-12-24 01:03
Modified
2024-08-04 04:39
Severity ?
EPSS score ?
Summary
In MediaWiki through 1.37, the Special:ImportFile URI (aka FileImporter) allows XSS, as demonstrated by the clientUrl parameter.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T296605 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/Id1c8910aeac5b452fbabeddab70360765518223e | x_refsource_MISC | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7JNQA53K675TQBBJPZRAG5ZT6XES3IS/ | vendor-advisory, x_refsource_FEDORA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:39:21.052Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T296605" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/Id1c8910aeac5b452fbabeddab70360765518223e" }, { "name": "FEDORA-2021-bef1126908", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7JNQA53K675TQBBJPZRAG5ZT6XES3IS/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In MediaWiki through 1.37, the Special:ImportFile URI (aka FileImporter) allows XSS, as demonstrated by the clientUrl parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-08T02:06:11", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T296605" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/Id1c8910aeac5b452fbabeddab70360765518223e" }, { "name": "FEDORA-2021-bef1126908", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7JNQA53K675TQBBJPZRAG5ZT6XES3IS/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-45474", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In MediaWiki through 1.37, the Special:ImportFile URI (aka FileImporter) allows XSS, as demonstrated by the clientUrl parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T296605", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T296605" }, { "name": "https://gerrit.wikimedia.org/r/q/Id1c8910aeac5b452fbabeddab70360765518223e", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/Id1c8910aeac5b452fbabeddab70360765518223e" }, { "name": "FEDORA-2021-bef1126908", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7JNQA53K675TQBBJPZRAG5ZT6XES3IS/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-45474", "datePublished": "2021-12-24T01:03:28", "dateReserved": "2021-12-24T00:00:00", "dateUpdated": "2024-08-04T04:39:21.052Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-45364
Vulnerability from cvelistv5
Published
2023-10-09 00:00
Modified
2024-09-19 18:14
Severity ?
EPSS score ?
Summary
An issue was discovered in includes/page/Article.php in MediaWiki 1.36.x through 1.39.x before 1.39.5 and 1.40.x before 1.40.1. Deleted revision existence is leaked due to incorrect permissions being checked. This reveals that a given revision ID belonged to the given page title, and its timestamp, both of which are not supposed to be public information.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T264765 | ||
https://www.debian.org/security/2023/dsa-5520 | vendor-advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:21:16.625Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T264765" }, { "name": "DSA-5520", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5520" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-45364", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-19T18:12:46.168162Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-19T18:14:01.953Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in includes/page/Article.php in MediaWiki 1.36.x through 1.39.x before 1.39.5 and 1.40.x before 1.40.1. Deleted revision existence is leaked due to incorrect permissions being checked. This reveals that a given revision ID belonged to the given page title, and its timestamp, both of which are not supposed to be public information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-11T01:06:18.082273", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T264765" }, { "name": "DSA-5520", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2023/dsa-5520" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-45364", "datePublished": "2023-10-09T00:00:00", "dateReserved": "2023-10-09T00:00:00", "dateUpdated": "2024-09-19T18:14:01.953Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-42042
Vulnerability from cvelistv5
Published
2021-10-06 20:28
Modified
2024-08-04 03:22
Severity ?
EPSS score ?
Summary
An issue was discovered in SpecialEditGrowthConfig in the GrowthExperiments extension in MediaWiki through 1.36.2. The growthexperiments-edit-config-error-invalid-title MediaWiki message was not being properly sanitized and allowed for the injection and execution of HTML and JavaScript.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T290692 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/Ibeb13d032ca044af53f6b2334e27b6b97b6f4e9f | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:22:25.803Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T290692" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/Ibeb13d032ca044af53f6b2334e27b6b97b6f4e9f" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in SpecialEditGrowthConfig in the GrowthExperiments extension in MediaWiki through 1.36.2. The growthexperiments-edit-config-error-invalid-title MediaWiki message was not being properly sanitized and allowed for the injection and execution of HTML and JavaScript." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-06T20:28:33", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T290692" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/Ibeb13d032ca044af53f6b2334e27b6b97b6f4e9f" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-42042", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in SpecialEditGrowthConfig in the GrowthExperiments extension in MediaWiki through 1.36.2. The growthexperiments-edit-config-error-invalid-title MediaWiki message was not being properly sanitized and allowed for the injection and execution of HTML and JavaScript." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T290692", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T290692" }, { "name": "https://gerrit.wikimedia.org/r/q/Ibeb13d032ca044af53f6b2334e27b6b97b6f4e9f", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/Ibeb13d032ca044af53f6b2334e27b6b97b6f4e9f" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-42042", "datePublished": "2021-10-06T20:28:33", "dateReserved": "2021-10-06T00:00:00", "dateUpdated": "2024-08-04T03:22:25.803Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-3550
Vulnerability from cvelistv5
Published
2023-09-25 15:20
Modified
2024-09-24 15:57
Severity ?
EPSS score ?
Summary
Mediawiki v1.40.0 does not validate namespaces used in XML files.
Therefore, if the instance administrator allows XML file uploads,
a remote attacker with a low-privileged user account can use this
exploit to become an administrator by sending a malicious link to
the instance administrator.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:01:56.435Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://fluidattacks.com/advisories/blondie/" }, { "tags": [ "x_transferred" ], "url": "https://www.mediawiki.org/wiki/MediaWiki/" }, { "tags": [ "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5520" }, { "tags": [ "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00027.html" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FU2FGUXXK6TMV6R52VRECLC6XCSQQISY/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-3550", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-24T15:57:17.402370Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-24T15:57:25.148Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "MacOS" ], "product": "MediaWiki", "vendor": "MediaWiki", "versions": [ { "status": "affected", "version": "1.40.0" } ] } ], "datePublic": "2023-10-11T17:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cdiv\u003e\u003cdiv\u003eMediawiki v1.40.0 does not validate namespaces used in XML files.\u003c/div\u003e\u003cdiv\u003eTherefore, if the instance administrator allows XML file uploads,\u003c/div\u003e\u003cdiv\u003ea remote attacker with a low-privileged user account can use this\u003c/div\u003e\u003cdiv\u003eexploit to become an administrator by sending a malicious link to\u003c/div\u003e\u003cdiv\u003ethe instance administrator.\u003c/div\u003e\u003c/div\u003e" } ], "value": "Mediawiki v1.40.0 does not validate namespaces used in XML files.\n\nTherefore, if the instance administrator allows XML file uploads,\n\na remote attacker with a low-privileged user account can use this\n\nexploit to become an administrator by sending a malicious link to\n\nthe instance administrator.\n\n\n\n" } ], "impacts": [ { "capecId": "CAPEC-592", "descriptions": [ { "lang": "en", "value": "CAPEC-592 Stored XSS" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-25T15:20:27.351Z", "orgId": "84fe0718-d6bb-4716-a7e8-81a6d1daa869", "shortName": "Fluid Attacks" }, "references": [ { "url": "https://fluidattacks.com/advisories/blondie/" }, { "url": "https://www.mediawiki.org/wiki/MediaWiki/" }, { "url": "https://www.debian.org/security/2023/dsa-5520" }, { "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00027.html" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FU2FGUXXK6TMV6R52VRECLC6XCSQQISY/" } ], "source": { "discovery": "EXTERNAL" }, "title": "Stored XSS leads to privilege escalation in MediaWiki v1.40.0", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "84fe0718-d6bb-4716-a7e8-81a6d1daa869", "assignerShortName": "Fluid Attacks", "cveId": "CVE-2023-3550", "datePublished": "2023-09-25T15:20:27.351Z", "dateReserved": "2023-07-08T01:02:40.399Z", "dateUpdated": "2024-09-24T15:57:25.148Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-4380
Vulnerability from cvelistv5
Published
2017-10-19 21:00
Modified
2024-08-06 20:35
Severity ?
EPSS score ?
Summary
MediaWiki before 1.18.5, and 1.19.x before 1.19.2 allows remote attackers to bypass GlobalBlocking extension IP address blocking and create an account via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2012/08/31/6 | mailing-list, x_refsource_MLIST | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2012-August/000119.html | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2012/08/31/10 | mailing-list, x_refsource_MLIST | |
https://bugzilla.redhat.com/show_bug.cgi?id=853440 | x_refsource_CONFIRM | |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330 | x_refsource_MISC | |
https://phabricator.wikimedia.org/T41824 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:35:08.793Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20120831 CVE Request -- MediaWiki 1.19.2 and 1.18.5 multiple security flaws", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/08/31/6" }, { "name": "[MediaWiki-announce] 20120831 MediaWiki security release: 1.19.2 and 1.18.5", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2012-August/000119.html" }, { "name": "[oss-security] 20120831 Re: CVE Request -- MediaWiki 1.19.2 and 1.18.5 multiple security flaws", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/08/31/10" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853440" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T41824" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-08-31T00:00:00", "descriptions": [ { "lang": "en", "value": "MediaWiki before 1.18.5, and 1.19.x before 1.19.2 allows remote attackers to bypass GlobalBlocking extension IP address blocking and create an account via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-19T20:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[oss-security] 20120831 CVE Request -- MediaWiki 1.19.2 and 1.18.5 multiple security flaws", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/08/31/6" }, { "name": "[MediaWiki-announce] 20120831 MediaWiki security release: 1.19.2 and 1.18.5", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2012-August/000119.html" }, { "name": "[oss-security] 20120831 Re: CVE Request -- MediaWiki 1.19.2 and 1.18.5 multiple security flaws", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/08/31/10" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853440" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T41824" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-4380", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MediaWiki before 1.18.5, and 1.19.x before 1.19.2 allows remote attackers to bypass GlobalBlocking extension IP address blocking and create an account via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20120831 CVE Request -- MediaWiki 1.19.2 and 1.18.5 multiple security flaws", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2012/08/31/6" }, { "name": "[MediaWiki-announce] 20120831 MediaWiki security release: 1.19.2 and 1.18.5", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2012-August/000119.html" }, { "name": "[oss-security] 20120831 Re: CVE Request -- MediaWiki 1.19.2 and 1.18.5 multiple security flaws", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2012/08/31/10" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=853440", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853440" }, { "name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330", "refsource": "MISC", "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330" }, { "name": "https://phabricator.wikimedia.org/T41824", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T41824" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-4380", "datePublished": "2017-10-19T21:00:00", "dateReserved": "2012-08-21T00:00:00", "dateUpdated": "2024-08-06T20:35:08.793Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-12466
Vulnerability from cvelistv5
Published
2019-07-10 15:31
Modified
2024-08-04 23:17
Severity ?
EPSS score ?
Summary
Wikimedia MediaWiki through 1.32.1 allows CSRF.
References
▼ | URL | Tags |
---|---|---|
https://www.debian.org/security/2019/dsa-4460 | vendor-advisory, x_refsource_DEBIAN | |
https://seclists.org/bugtraq/2019/Jun/12 | mailing-list, x_refsource_BUGTRAQ | |
https://lists.wikimedia.org/pipermail/wikitech-l/2019-June/092152.html | x_refsource_CONFIRM | |
https://phabricator.wikimedia.org/T25227 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:17:40.266Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "DSA-4460", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2019/dsa-4460" }, { "name": "20190612 [SECURITY] [DSA 4460-1] mediawiki security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Jun/12" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2019-June/092152.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T25227" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Wikimedia MediaWiki through 1.32.1 allows CSRF." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-07-10T15:32:35", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "DSA-4460", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2019/dsa-4460" }, { "name": "20190612 [SECURITY] [DSA 4460-1] mediawiki security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Jun/12" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2019-June/092152.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T25227" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-12466", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Wikimedia MediaWiki through 1.32.1 allows CSRF." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "DSA-4460", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2019/dsa-4460" }, { "name": "20190612 [SECURITY] [DSA 4460-1] mediawiki security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Jun/12" }, { "name": "https://lists.wikimedia.org/pipermail/wikitech-l/2019-June/092152.html", "refsource": "CONFIRM", "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2019-June/092152.html" }, { "name": "https://phabricator.wikimedia.org/T25227", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T25227" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-12466", "datePublished": "2019-07-10T15:31:50", "dateReserved": "2019-05-30T00:00:00", "dateUpdated": "2024-08-04T23:17:40.266Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-23179
Vulnerability from cvelistv5
Published
2024-01-12 00:00
Modified
2024-09-25 20:34
Severity ?
EPSS score ?
Summary
An issue was discovered in the GlobalBlocking extension in MediaWiki before 1.40.2. For a Special:GlobalBlock?uselang=x-xss URI, i18n-based XSS can occur via the parentheses message. This affects subtitle links in buildSubtitleLinks.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T22:59:32.073Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://lists.wikimedia.org/hyperkitty/list/mediawiki-announce%40lists.wikimedia.org/message/TDBUBCCOQJUT4SCHJNPHKQNPBUUETY52/" }, { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T347746" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-23179", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-25T20:31:46.384170Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-25T20:34:20.981Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the GlobalBlocking extension in MediaWiki before 1.40.2. For a Special:GlobalBlock?uselang=x-xss URI, i18n-based XSS can occur via the parentheses message. This affects subtitle links in buildSubtitleLinks." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-12T05:13:59.107634", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://lists.wikimedia.org/hyperkitty/list/mediawiki-announce%40lists.wikimedia.org/message/TDBUBCCOQJUT4SCHJNPHKQNPBUUETY52/" }, { "url": "https://phabricator.wikimedia.org/T347746" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-23179", "datePublished": "2024-01-12T00:00:00", "dateReserved": "2024-01-12T00:00:00", "dateUpdated": "2024-09-25T20:34:20.981Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-35479
Vulnerability from cvelistv5
Published
2020-12-18 07:42
Modified
2024-08-04 17:02
Severity ?
EPSS score ?
Summary
MediaWiki before 1.35.1 allows XSS via BlockLogFormatter.php. Language::translateBlockExpiry itself does not escape in all code paths. For example, the return of Language::userTimeAndDate is is always unsafe for HTML in a month value. This affects MediaWiki 1.12.0 and later.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T268938 | x_refsource_MISC | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2020-December/000268.html | x_refsource_MISC | |
https://www.debian.org/security/2020/dsa-4816 | vendor-advisory, x_refsource_DEBIAN | |
https://lists.debian.org/debian-lts-announce/2020/12/msg00034.html | mailing-list, x_refsource_MLIST | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STT5Z4A3BCXVH3WIPICWU2FP4IPIMUPC/ | vendor-advisory, x_refsource_FEDORA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:02:08.034Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T268938" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2020-December/000268.html" }, { "name": "DSA-4816", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2020/dsa-4816" }, { "name": "[debian-lts-announce] 20201223 [SECURITY] [DLA 2504-1] mediawiki security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00034.html" }, { "name": "FEDORA-2020-0be2d40e13", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STT5Z4A3BCXVH3WIPICWU2FP4IPIMUPC/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "MediaWiki before 1.35.1 allows XSS via BlockLogFormatter.php. Language::translateBlockExpiry itself does not escape in all code paths. For example, the return of Language::userTimeAndDate is is always unsafe for HTML in a month value. This affects MediaWiki 1.12.0 and later." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-27T03:06:14", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T268938" }, { "tags": [ "x_refsource_MISC" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2020-December/000268.html" }, { "name": "DSA-4816", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2020/dsa-4816" }, { "name": "[debian-lts-announce] 20201223 [SECURITY] [DLA 2504-1] mediawiki security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00034.html" }, { "name": "FEDORA-2020-0be2d40e13", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STT5Z4A3BCXVH3WIPICWU2FP4IPIMUPC/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-35479", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MediaWiki before 1.35.1 allows XSS via BlockLogFormatter.php. Language::translateBlockExpiry itself does not escape in all code paths. For example, the return of Language::userTimeAndDate is is always unsafe for HTML in a month value. This affects MediaWiki 1.12.0 and later." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T268938", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T268938" }, { "name": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2020-December/000268.html", "refsource": "MISC", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2020-December/000268.html" }, { "name": "DSA-4816", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4816" }, { "name": "[debian-lts-announce] 20201223 [SECURITY] [DLA 2504-1] mediawiki security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00034.html" }, { "name": "FEDORA-2020-0be2d40e13", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STT5Z4A3BCXVH3WIPICWU2FP4IPIMUPC/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-35479", "datePublished": "2020-12-18T07:42:25", "dateReserved": "2020-12-16T00:00:00", "dateUpdated": "2024-08-04T17:02:08.034Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-47927
Vulnerability from cvelistv5
Published
2023-01-12 00:00
Modified
2024-08-03 15:02
Severity ?
EPSS score ?
Summary
An issue was discovered in MediaWiki before 1.35.9, 1.36.x through 1.38.x before 1.38.5, and 1.39.x before 1.39.1. When installing with a pre-existing data directory that has weak permissions, the SQLite files are created with file mode 0644, i.e., world readable to local users. These files include credentials data.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T15:02:36.447Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T322637" }, { "tags": [ "x_transferred" ], "url": "https://lists.wikimedia.org/hyperkitty/list/mediawiki-announce%40lists.wikimedia.org/thread/UEMW64LVEH3BEXCJV43CVS6XPYURKWU3/" }, { "name": "FEDORA-2023-30a7a812f0", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AP65YEN762IBNQPOYGUVLTQIDLM5XD2A/" }, { "name": "GLSA-202305-24", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202305-24" }, { "name": "[debian-lts-announce] 20230710 [SECURITY] [DLA 3489-1] mediawiki security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00011.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MediaWiki before 1.35.9, 1.36.x through 1.38.x before 1.38.5, and 1.39.x before 1.39.1. When installing with a pre-existing data directory that has weak permissions, the SQLite files are created with file mode 0644, i.e., world readable to local users. These files include credentials data." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-10T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T322637" }, { "url": "https://lists.wikimedia.org/hyperkitty/list/mediawiki-announce%40lists.wikimedia.org/thread/UEMW64LVEH3BEXCJV43CVS6XPYURKWU3/" }, { "name": "FEDORA-2023-30a7a812f0", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AP65YEN762IBNQPOYGUVLTQIDLM5XD2A/" }, { "name": "GLSA-202305-24", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202305-24" }, { "name": "[debian-lts-announce] 20230710 [SECURITY] [DLA 3489-1] mediawiki security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00011.html" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-47927", "datePublished": "2023-01-12T00:00:00", "dateReserved": "2022-12-22T00:00:00", "dateUpdated": "2024-08-03T15:02:36.447Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-4828
Vulnerability from cvelistv5
Published
2007-09-12 19:00
Modified
2024-08-07 15:08
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in the API pretty-printing mode in MediaWiki 1.8.0 through 1.8.4, 1.9.0 through 1.9.3, 1.10.0 through 1.10.1, and the 1.11 development versions before 1.11.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/25632 | vdb-entry, x_refsource_BID | |
http://www.vupen.com/english/advisories/2007/3130 | vdb-entry, x_refsource_VUPEN | |
http://fedoranews.org/updates/FEDORA-2007-218.shtml | vendor-advisory, x_refsource_FEDORA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/36558 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/26772 | third-party-advisory, x_refsource_SECUNIA | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2007-September/000067.html | mailing-list, x_refsource_MLIST | |
http://secunia.com/advisories/26870 | third-party-advisory, x_refsource_SECUNIA | |
https://bugzilla.redhat.com/show_bug.cgi?id=287881 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:08:33.908Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "25632", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/25632" }, { "name": "ADV-2007-3130", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/3130" }, { "name": "FEDORA-2007-2189", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://fedoranews.org/updates/FEDORA-2007-218.shtml" }, { "name": "mediawiki-prettyprinting-xss(36558)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36558" }, { "name": "26772", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26772" }, { "name": "[MediaWiki-announce] 20070910 MediaWiki 1.11.0, 1.10.2, 1.9.4, 1.8.5 released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2007-September/000067.html" }, { "name": "26870", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26870" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=287881" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-09-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the API pretty-printing mode in MediaWiki 1.8.0 through 1.8.4, 1.9.0 through 1.9.3, 1.10.0 through 1.10.1, and the 1.11 development versions before 1.11.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "25632", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/25632" }, { "name": "ADV-2007-3130", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/3130" }, { "name": "FEDORA-2007-2189", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://fedoranews.org/updates/FEDORA-2007-218.shtml" }, { "name": "mediawiki-prettyprinting-xss(36558)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36558" }, { "name": "26772", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26772" }, { "name": "[MediaWiki-announce] 20070910 MediaWiki 1.11.0, 1.10.2, 1.9.4, 1.8.5 released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2007-September/000067.html" }, { "name": "26870", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26870" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=287881" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2007-4828", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the API pretty-printing mode in MediaWiki 1.8.0 through 1.8.4, 1.9.0 through 1.9.3, 1.10.0 through 1.10.1, and the 1.11 development versions before 1.11.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "25632", "refsource": "BID", "url": "http://www.securityfocus.com/bid/25632" }, { "name": "ADV-2007-3130", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/3130" }, { "name": "FEDORA-2007-2189", "refsource": "FEDORA", "url": "http://fedoranews.org/updates/FEDORA-2007-218.shtml" }, { "name": "mediawiki-prettyprinting-xss(36558)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36558" }, { "name": "26772", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26772" }, { "name": "[MediaWiki-announce] 20070910 MediaWiki 1.11.0, 1.10.2, 1.9.4, 1.8.5 released", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2007-September/000067.html" }, { "name": "26870", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26870" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=287881", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=287881" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2007-4828", "datePublished": "2007-09-12T19:00:00", "dateReserved": "2007-09-12T00:00:00", "dateUpdated": "2024-08-07T15:08:33.908Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-8808
Vulnerability from cvelistv5
Published
2017-11-15 08:00
Modified
2024-08-05 16:48
Severity ?
EPSS score ?
Summary
MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2 has XSS when the $wgShowExceptionDetails setting is false and the browser sends non-standard URL escaping.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1039812 | vdb-entry, x_refsource_SECTRACK | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-November/000216.html | x_refsource_CONFIRM | |
https://www.debian.org/security/2017/dsa-4036 | vendor-advisory, x_refsource_DEBIAN |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2 |
Version: MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T16:48:22.553Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1039812", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039812" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-November/000216.html" }, { "name": "DSA-4036", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2017/dsa-4036" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2", "vendor": "n/a", "versions": [ { "status": "affected", "version": "MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2" } ] } ], "datePublic": "2017-11-15T00:00:00", "descriptions": [ { "lang": "en", "value": "MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2 has XSS when the $wgShowExceptionDetails setting is false and the browser sends non-standard URL escaping." } ], "problemTypes": [ { "descriptions": [ { "description": "XSS", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-16T10:57:01", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "name": "1039812", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039812" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-November/000216.html" }, { "name": "DSA-4036", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2017/dsa-4036" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "ID": "CVE-2017-8808", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2", "version": { "version_data": [ { "version_value": "MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2 has XSS when the $wgShowExceptionDetails setting is false and the browser sends non-standard URL escaping." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "XSS" } ] } ] }, "references": { "reference_data": [ { "name": "1039812", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039812" }, { "name": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-November/000216.html", "refsource": "CONFIRM", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-November/000216.html" }, { "name": "DSA-4036", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2017/dsa-4036" } ] } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2017-8808", "datePublished": "2017-11-15T08:00:00", "dateReserved": "2017-05-07T00:00:00", "dateUpdated": "2024-08-05T16:48:22.553Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-35477
Vulnerability from cvelistv5
Published
2020-12-18 07:37
Modified
2024-08-04 17:02
Severity ?
EPSS score ?
Summary
MediaWiki before 1.35.1 blocks legitimate attempts to hide log entries in some situations. If one sets MediaWiki:Mainpage to Special:MyLanguage/Main Page, visits a log entry on Special:Log, and toggles the "Change visibility of selected log entries" checkbox (or a tags checkbox) next to it, there is a redirection to the main page's action=historysubmit (instead of the desired behavior in which a revision-deletion form appears).
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T205908 | x_refsource_MISC | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2020-December/000268.html | x_refsource_MISC | |
https://www.debian.org/security/2020/dsa-4816 | vendor-advisory, x_refsource_DEBIAN | |
https://lists.debian.org/debian-lts-announce/2020/12/msg00034.html | mailing-list, x_refsource_MLIST | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STT5Z4A3BCXVH3WIPICWU2FP4IPIMUPC/ | vendor-advisory, x_refsource_FEDORA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:02:08.156Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T205908" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2020-December/000268.html" }, { "name": "DSA-4816", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2020/dsa-4816" }, { "name": "[debian-lts-announce] 20201223 [SECURITY] [DLA 2504-1] mediawiki security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00034.html" }, { "name": "FEDORA-2020-0be2d40e13", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STT5Z4A3BCXVH3WIPICWU2FP4IPIMUPC/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "MediaWiki before 1.35.1 blocks legitimate attempts to hide log entries in some situations. If one sets MediaWiki:Mainpage to Special:MyLanguage/Main Page, visits a log entry on Special:Log, and toggles the \"Change visibility of selected log entries\" checkbox (or a tags checkbox) next to it, there is a redirection to the main page\u0027s action=historysubmit (instead of the desired behavior in which a revision-deletion form appears)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-27T03:06:14", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T205908" }, { "tags": [ "x_refsource_MISC" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2020-December/000268.html" }, { "name": "DSA-4816", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2020/dsa-4816" }, { "name": "[debian-lts-announce] 20201223 [SECURITY] [DLA 2504-1] mediawiki security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00034.html" }, { "name": "FEDORA-2020-0be2d40e13", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STT5Z4A3BCXVH3WIPICWU2FP4IPIMUPC/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-35477", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MediaWiki before 1.35.1 blocks legitimate attempts to hide log entries in some situations. If one sets MediaWiki:Mainpage to Special:MyLanguage/Main Page, visits a log entry on Special:Log, and toggles the \"Change visibility of selected log entries\" checkbox (or a tags checkbox) next to it, there is a redirection to the main page\u0027s action=historysubmit (instead of the desired behavior in which a revision-deletion form appears)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T205908", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T205908" }, { "name": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2020-December/000268.html", "refsource": "MISC", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2020-December/000268.html" }, { "name": "DSA-4816", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4816" }, { "name": "[debian-lts-announce] 20201223 [SECURITY] [DLA 2504-1] mediawiki security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00034.html" }, { "name": "FEDORA-2020-0be2d40e13", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STT5Z4A3BCXVH3WIPICWU2FP4IPIMUPC/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-35477", "datePublished": "2020-12-18T07:37:24", "dateReserved": "2020-12-16T00:00:00", "dateUpdated": "2024-08-04T17:02:08.156Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-30158
Vulnerability from cvelistv5
Published
2021-04-06 06:42
Modified
2024-08-03 22:24
Severity ?
EPSS score ?
Summary
An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. Blocked users are unable to use Special:ResetTokens. This has security relevance because a blocked user might have accidentally shared a token, or might know that a token has been compromised, and yet is not able to block any potential future use of the token by an unauthorized party.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T277009 | x_refsource_MISC | |
https://www.debian.org/security/2021/dsa-4889 | vendor-advisory, x_refsource_DEBIAN | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/26UJGHF7LJDOCQN6A3Z4PM7PYRKENJHE/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2OMSV7B2TCFBOCICN3B4SMQP5HVRJQIT/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.debian.org/debian-lts-announce/2021/05/msg00003.html | mailing-list, x_refsource_MLIST | |
https://lists.debian.org/debian-lts-announce/2021/05/msg00006.html | mailing-list, x_refsource_MLIST | |
https://security.gentoo.org/glsa/202107-40 | vendor-advisory, x_refsource_GENTOO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T22:24:59.672Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T277009" }, { "name": "DSA-4889", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2021/dsa-4889" }, { "name": "FEDORA-2021-f4223b6684", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/26UJGHF7LJDOCQN6A3Z4PM7PYRKENJHE/" }, { "name": "FEDORA-2021-d298103d3a", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2OMSV7B2TCFBOCICN3B4SMQP5HVRJQIT/" }, { "name": "[debian-lts-announce] 20210505 [SECURITY] [DLA 2648-1] mediawiki security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00003.html" }, { "name": "[debian-lts-announce] 20210506 [SECURITY] [DLA 2648-2] mediawiki regression update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00006.html" }, { "name": "GLSA-202107-40", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202107-40" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. Blocked users are unable to use Special:ResetTokens. This has security relevance because a blocked user might have accidentally shared a token, or might know that a token has been compromised, and yet is not able to block any potential future use of the token by an unauthorized party." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-17T07:06:43", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T277009" }, { "name": "DSA-4889", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2021/dsa-4889" }, { "name": "FEDORA-2021-f4223b6684", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/26UJGHF7LJDOCQN6A3Z4PM7PYRKENJHE/" }, { "name": "FEDORA-2021-d298103d3a", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2OMSV7B2TCFBOCICN3B4SMQP5HVRJQIT/" }, { "name": "[debian-lts-announce] 20210505 [SECURITY] [DLA 2648-1] mediawiki security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00003.html" }, { "name": "[debian-lts-announce] 20210506 [SECURITY] [DLA 2648-2] mediawiki regression update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00006.html" }, { "name": "GLSA-202107-40", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202107-40" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-30158", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. Blocked users are unable to use Special:ResetTokens. This has security relevance because a blocked user might have accidentally shared a token, or might know that a token has been compromised, and yet is not able to block any potential future use of the token by an unauthorized party." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T277009", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T277009" }, { "name": "DSA-4889", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4889" }, { "name": "FEDORA-2021-f4223b6684", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/26UJGHF7LJDOCQN6A3Z4PM7PYRKENJHE/" }, { "name": "FEDORA-2021-d298103d3a", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2OMSV7B2TCFBOCICN3B4SMQP5HVRJQIT/" }, { "name": "[debian-lts-announce] 20210505 [SECURITY] [DLA 2648-1] mediawiki security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00003.html" }, { "name": "[debian-lts-announce] 20210506 [SECURITY] [DLA 2648-2] mediawiki regression update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00006.html" }, { "name": "GLSA-202107-40", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202107-40" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-30158", "datePublished": "2021-04-06T06:42:45", "dateReserved": "2021-04-06T00:00:00", "dateUpdated": "2024-08-03T22:24:59.672Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-45473
Vulnerability from cvelistv5
Published
2021-12-24 01:03
Modified
2024-08-04 04:39
Severity ?
EPSS score ?
Summary
In MediaWiki through 1.37, Wikibase item descriptions allow XSS, which is triggered upon a visit to an action=info URL (aka a page-information sidebar).
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T294693 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/I3cd080a1a7dacd7396d37ee0c98cff0b4e241f8d | x_refsource_MISC | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7JNQA53K675TQBBJPZRAG5ZT6XES3IS/ | vendor-advisory, x_refsource_FEDORA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:39:21.045Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T294693" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/I3cd080a1a7dacd7396d37ee0c98cff0b4e241f8d" }, { "name": "FEDORA-2021-bef1126908", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7JNQA53K675TQBBJPZRAG5ZT6XES3IS/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In MediaWiki through 1.37, Wikibase item descriptions allow XSS, which is triggered upon a visit to an action=info URL (aka a page-information sidebar)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-08T02:06:14", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T294693" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/I3cd080a1a7dacd7396d37ee0c98cff0b4e241f8d" }, { "name": "FEDORA-2021-bef1126908", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7JNQA53K675TQBBJPZRAG5ZT6XES3IS/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-45473", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In MediaWiki through 1.37, Wikibase item descriptions allow XSS, which is triggered upon a visit to an action=info URL (aka a page-information sidebar)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T294693", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T294693" }, { "name": "https://gerrit.wikimedia.org/r/q/I3cd080a1a7dacd7396d37ee0c98cff0b4e241f8d", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/I3cd080a1a7dacd7396d37ee0c98cff0b4e241f8d" }, { "name": "FEDORA-2021-bef1126908", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7JNQA53K675TQBBJPZRAG5ZT6XES3IS/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-45473", "datePublished": "2021-12-24T01:03:46", "dateReserved": "2021-12-24T00:00:00", "dateUpdated": "2024-08-04T04:39:21.045Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-31546
Vulnerability from cvelistv5
Published
2021-04-22 02:30
Modified
2024-08-03 23:03
Severity ?
EPSS score ?
Summary
An issue was discovered in the AbuseFilter extension for MediaWiki through 1.35.2. It incorrectly logged sensitive suppression deletions, which should not have been visible to users with access to view AbuseFilter log data.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T71617 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/I38a0a24fa32ca7a052b6940864a32b3856e84553 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:03:33.347Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T71617" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/I38a0a24fa32ca7a052b6940864a32b3856e84553" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the AbuseFilter extension for MediaWiki through 1.35.2. It incorrectly logged sensitive suppression deletions, which should not have been visible to users with access to view AbuseFilter log data." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-22T02:30:48", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T71617" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/I38a0a24fa32ca7a052b6940864a32b3856e84553" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-31546", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in the AbuseFilter extension for MediaWiki through 1.35.2. It incorrectly logged sensitive suppression deletions, which should not have been visible to users with access to view AbuseFilter log data." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T71617", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T71617" }, { "name": "https://gerrit.wikimedia.org/r/q/I38a0a24fa32ca7a052b6940864a32b3856e84553", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/I38a0a24fa32ca7a052b6940864a32b3856e84553" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-31546", "datePublished": "2021-04-22T02:30:48", "dateReserved": "2021-04-22T00:00:00", "dateUpdated": "2024-08-03T23:03:33.347Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-8622
Vulnerability from cvelistv5
Published
2017-03-23 20:00
Modified
2024-08-06 08:20
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in MediaWiki before 1.23.12, 1.24.x before 1.24.5, 1.25.x before 1.25.4, and 1.26.x before 1.26.1, when is configured with a relative URL, allows remote authenticated users to inject arbitrary web script or HTML via wikitext, as demonstrated by a wikilink to a page named "javascript:alert('XSS!')."
References
▼ | URL | Tags |
---|---|---|
https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-December/000186.html | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2015/12/23/7 | mailing-list, x_refsource_MLIST | |
https://phabricator.wikimedia.org/T117899 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2015/12/21/8 | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:20:43.681Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[MediaWiki-announce] 20151221 [MediaWiki-announce] Security Release: 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-December/000186.html" }, { "name": "[oss-security] 20151223 Re: CVE requests for MediaWiki 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/12/23/7" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T117899" }, { "name": "[oss-security] 20151221 CVE requests for MediaWiki 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/12/21/8" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-12-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in MediaWiki before 1.23.12, 1.24.x before 1.24.5, 1.25.x before 1.25.4, and 1.26.x before 1.26.1, when is configured with a relative URL, allows remote authenticated users to inject arbitrary web script or HTML via wikitext, as demonstrated by a wikilink to a page named \"javascript:alert(\u0027XSS!\u0027).\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-03-23T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[MediaWiki-announce] 20151221 [MediaWiki-announce] Security Release: 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-December/000186.html" }, { "name": "[oss-security] 20151223 Re: CVE requests for MediaWiki 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/12/23/7" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T117899" }, { "name": "[oss-security] 20151221 CVE requests for MediaWiki 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/12/21/8" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-8622", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in MediaWiki before 1.23.12, 1.24.x before 1.24.5, 1.25.x before 1.25.4, and 1.26.x before 1.26.1, when is configured with a relative URL, allows remote authenticated users to inject arbitrary web script or HTML via wikitext, as demonstrated by a wikilink to a page named \"javascript:alert(\u0027XSS!\u0027).\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[MediaWiki-announce] 20151221 [MediaWiki-announce] Security Release: 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-December/000186.html" }, { "name": "[oss-security] 20151223 Re: CVE requests for MediaWiki 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/12/23/7" }, { "name": "https://phabricator.wikimedia.org/T117899", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T117899" }, { "name": "[oss-security] 20151221 CVE requests for MediaWiki 1.26.1, 1.25.4, 1.24.5 and 1.23.12", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/12/21/8" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-8622", "datePublished": "2017-03-23T20:00:00", "dateReserved": "2015-12-23T00:00:00", "dateUpdated": "2024-08-06T08:20:43.681Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-1818
Vulnerability from cvelistv5
Published
2014-06-02 15:00
Modified
2024-08-06 15:13
Severity ?
EPSS score ?
Summary
maintenance/mwdoc-filter.php in MediaWiki before 1.20.3 allows remote attackers to read arbitrary files via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.mediawiki.org/wiki/Release_notes/1.20 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/88363 | vdb-entry, x_refsource_XF | |
https://bugzilla.wikimedia.org/show_bug.cgi?id=45355 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/58304 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:13:33.196Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mediawiki.org/wiki/Release_notes/1.20" }, { "name": "mediawiki-cve20131818-info-disclosure(88363)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/88363" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=45355" }, { "name": "58304", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/58304" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-02-25T00:00:00", "descriptions": [ { "lang": "en", "value": "maintenance/mwdoc-filter.php in MediaWiki before 1.20.3 allows remote attackers to read arbitrary files via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mediawiki.org/wiki/Release_notes/1.20" }, { "name": "mediawiki-cve20131818-info-disclosure(88363)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/88363" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=45355" }, { "name": "58304", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/58304" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-1818", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "maintenance/mwdoc-filter.php in MediaWiki before 1.20.3 allows remote attackers to read arbitrary files via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.mediawiki.org/wiki/Release_notes/1.20", "refsource": "CONFIRM", "url": "http://www.mediawiki.org/wiki/Release_notes/1.20" }, { "name": "mediawiki-cve20131818-info-disclosure(88363)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/88363" }, { "name": "https://bugzilla.wikimedia.org/show_bug.cgi?id=45355", "refsource": "CONFIRM", "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=45355" }, { "name": "58304", "refsource": "BID", "url": "http://www.securityfocus.com/bid/58304" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-1818", "datePublished": "2014-06-02T15:00:00", "dateReserved": "2013-02-19T00:00:00", "dateUpdated": "2024-08-06T15:13:33.196Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-2941
Vulnerability from cvelistv5
Published
2015-04-13 14:00
Modified
2024-08-06 05:32
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2, when using HHVM, allows remote attackers to inject arbitrary web script or HTML via an invalid parameter in a wddx format request to api.php, which is not properly handled in an error message, related to unsafe calls to wddx_serialize_value.
References
▼ | URL | Tags |
---|---|---|
https://security.gentoo.org/glsa/201510-05 | vendor-advisory, x_refsource_GENTOO | |
https://phabricator.wikimedia.org/T85851 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/73477 | vdb-entry, x_refsource_BID | |
http://www.openwall.com/lists/oss-security/2015/04/07/3 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2015/04/01/1 | mailing-list, x_refsource_MLIST | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:32:20.872Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201510-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201510-05" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T85851" }, { "name": "73477", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/73477" }, { "name": "[oss-security] 20150407 Re: CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/04/07/3" }, { "name": "[oss-security] 20150331 CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/04/01/1" }, { "name": "[MediaWiki-announce] 20150331 MediaWiki Security and Maintenance Releases: 1.19.24, 1.23.9, and 1.24.2", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-03-31T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2, when using HHVM, allows remote attackers to inject arbitrary web script or HTML via an invalid parameter in a wddx format request to api.php, which is not properly handled in an error message, related to unsafe calls to wddx_serialize_value." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-05T21:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "GLSA-201510-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201510-05" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T85851" }, { "name": "73477", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/73477" }, { "name": "[oss-security] 20150407 Re: CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/04/07/3" }, { "name": "[oss-security] 20150331 CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/04/01/1" }, { "name": "[MediaWiki-announce] 20150331 MediaWiki Security and Maintenance Releases: 1.19.24, 1.23.9, and 1.24.2", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-2941", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2, when using HHVM, allows remote attackers to inject arbitrary web script or HTML via an invalid parameter in a wddx format request to api.php, which is not properly handled in an error message, related to unsafe calls to wddx_serialize_value." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201510-05", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201510-05" }, { "name": "https://phabricator.wikimedia.org/T85851", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T85851" }, { "name": "73477", "refsource": "BID", "url": "http://www.securityfocus.com/bid/73477" }, { "name": "[oss-security] 20150407 Re: CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/04/07/3" }, { "name": "[oss-security] 20150331 CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/04/01/1" }, { "name": "[MediaWiki-announce] 20150331 MediaWiki Security and Maintenance Releases: 1.19.24, 1.23.9, and 1.24.2", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-2941", "datePublished": "2015-04-13T14:00:00", "dateReserved": "2015-04-07T00:00:00", "dateUpdated": "2024-08-06T05:32:20.872Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-6336
Vulnerability from cvelistv5
Published
2017-04-20 17:00
Modified
2024-08-06 01:29
Severity ?
EPSS score ?
Summary
MediaWiki before 1.23.15, 1.26.x before 1.26.4, and 1.27.x before 1.27.1 allows remote authenticated users with undelete permissions to bypass intended suppressrevision and deleterevision restrictions and remove the revision deletion status of arbitrary file revisions by using Special:Undelete.
References
▼ | URL | Tags |
---|---|---|
https://lists.wikimedia.org/pipermail/mediawiki-announce/2016-August/000195.html | mailing-list, x_refsource_MLIST | |
https://bugzilla.redhat.com/show_bug.cgi?id=1369613 | x_refsource_CONFIRM | |
https://phabricator.wikimedia.org/T132926 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:29:19.386Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[MediaWiki-announce] 20160823 Security Release - 1.27.1, 1.26.4, 1.23.15", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2016-August/000195.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369613" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T132926" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-08-23T00:00:00", "descriptions": [ { "lang": "en", "value": "MediaWiki before 1.23.15, 1.26.x before 1.26.4, and 1.27.x before 1.27.1 allows remote authenticated users with undelete permissions to bypass intended suppressrevision and deleterevision restrictions and remove the revision deletion status of arbitrary file revisions by using Special:Undelete." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-04-20T16:57:02", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[MediaWiki-announce] 20160823 Security Release - 1.27.1, 1.26.4, 1.23.15", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2016-August/000195.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369613" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T132926" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-6336", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MediaWiki before 1.23.15, 1.26.x before 1.26.4, and 1.27.x before 1.27.1 allows remote authenticated users with undelete permissions to bypass intended suppressrevision and deleterevision restrictions and remove the revision deletion status of arbitrary file revisions by using Special:Undelete." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[MediaWiki-announce] 20160823 Security Release - 1.27.1, 1.26.4, 1.23.15", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2016-August/000195.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1369613", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369613" }, { "name": "https://phabricator.wikimedia.org/T132926", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T132926" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-6336", "datePublished": "2017-04-20T17:00:00", "dateReserved": "2016-07-26T00:00:00", "dateUpdated": "2024-08-06T01:29:19.386Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36126
Vulnerability from cvelistv5
Published
2021-07-02 13:01
Modified
2024-08-04 00:47
Severity ?
EPSS score ?
Summary
An issue was discovered in the AbuseFilter extension in MediaWiki through 1.36. If the MediaWiki:Abusefilter-blocker message is invalid within the content language, the filter user falls back to the English version, but that English version could also be invalid on a wiki. This would result in a fatal error, and potentially fail to block or restrict a potentially nefarious user.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T284364 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/I9e9f44b7663e810de70fb9ac7f6760f83dd4895b | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:47:43.820Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T284364" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/I9e9f44b7663e810de70fb9ac7f6760f83dd4895b" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the AbuseFilter extension in MediaWiki through 1.36. If the MediaWiki:Abusefilter-blocker message is invalid within the content language, the filter user falls back to the English version, but that English version could also be invalid on a wiki. This would result in a fatal error, and potentially fail to block or restrict a potentially nefarious user." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-02T13:01:05", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T284364" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/I9e9f44b7663e810de70fb9ac7f6760f83dd4895b" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-36126", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in the AbuseFilter extension in MediaWiki through 1.36. If the MediaWiki:Abusefilter-blocker message is invalid within the content language, the filter user falls back to the English version, but that English version could also be invalid on a wiki. This would result in a fatal error, and potentially fail to block or restrict a potentially nefarious user." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T284364", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T284364" }, { "name": "https://gerrit.wikimedia.org/r/q/I9e9f44b7663e810de70fb9ac7f6760f83dd4895b", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/I9e9f44b7663e810de70fb9ac7f6760f83dd4895b" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-36126", "datePublished": "2021-07-02T13:01:05", "dateReserved": "2021-07-02T00:00:00", "dateUpdated": "2024-08-04T00:47:43.820Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-30155
Vulnerability from cvelistv5
Published
2021-04-09 06:09
Modified
2024-08-03 22:24
Severity ?
EPSS score ?
Summary
An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. ContentModelChange does not check if a user has correct permissions to create and set the content model of a nonexistent page.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T270988 | x_refsource_MISC | |
https://www.debian.org/security/2021/dsa-4889 | vendor-advisory, x_refsource_DEBIAN | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/26UJGHF7LJDOCQN6A3Z4PM7PYRKENJHE/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2OMSV7B2TCFBOCICN3B4SMQP5HVRJQIT/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.debian.org/debian-lts-announce/2021/05/msg00003.html | mailing-list, x_refsource_MLIST | |
https://lists.debian.org/debian-lts-announce/2021/05/msg00006.html | mailing-list, x_refsource_MLIST | |
https://security.gentoo.org/glsa/202107-40 | vendor-advisory, x_refsource_GENTOO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T22:24:59.609Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T270988" }, { "name": "DSA-4889", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2021/dsa-4889" }, { "name": "FEDORA-2021-f4223b6684", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/26UJGHF7LJDOCQN6A3Z4PM7PYRKENJHE/" }, { "name": "FEDORA-2021-d298103d3a", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2OMSV7B2TCFBOCICN3B4SMQP5HVRJQIT/" }, { "name": "[debian-lts-announce] 20210505 [SECURITY] [DLA 2648-1] mediawiki security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00003.html" }, { "name": "[debian-lts-announce] 20210506 [SECURITY] [DLA 2648-2] mediawiki regression update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00006.html" }, { "name": "GLSA-202107-40", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202107-40" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. ContentModelChange does not check if a user has correct permissions to create and set the content model of a nonexistent page." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-17T07:06:27", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T270988" }, { "name": "DSA-4889", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2021/dsa-4889" }, { "name": "FEDORA-2021-f4223b6684", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/26UJGHF7LJDOCQN6A3Z4PM7PYRKENJHE/" }, { "name": "FEDORA-2021-d298103d3a", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2OMSV7B2TCFBOCICN3B4SMQP5HVRJQIT/" }, { "name": "[debian-lts-announce] 20210505 [SECURITY] [DLA 2648-1] mediawiki security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00003.html" }, { "name": "[debian-lts-announce] 20210506 [SECURITY] [DLA 2648-2] mediawiki regression update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00006.html" }, { "name": "GLSA-202107-40", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202107-40" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-30155", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. ContentModelChange does not check if a user has correct permissions to create and set the content model of a nonexistent page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T270988", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T270988" }, { "name": "DSA-4889", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4889" }, { "name": "FEDORA-2021-f4223b6684", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/26UJGHF7LJDOCQN6A3Z4PM7PYRKENJHE/" }, { "name": "FEDORA-2021-d298103d3a", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2OMSV7B2TCFBOCICN3B4SMQP5HVRJQIT/" }, { "name": "[debian-lts-announce] 20210505 [SECURITY] [DLA 2648-1] mediawiki security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00003.html" }, { "name": "[debian-lts-announce] 20210506 [SECURITY] [DLA 2648-2] mediawiki regression update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00006.html" }, { "name": "GLSA-202107-40", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202107-40" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-30155", "datePublished": "2021-04-09T06:09:46", "dateReserved": "2021-04-06T00:00:00", "dateUpdated": "2024-08-03T22:24:59.609Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-30152
Vulnerability from cvelistv5
Published
2021-04-09 06:08
Modified
2024-08-03 22:24
Severity ?
EPSS score ?
Summary
An issue was discovered in MediaWiki before 1.31.13 and 1.32.x through 1.35.x before 1.35.2. When using the MediaWiki API to "protect" a page, a user is currently able to protect to a higher level than they currently have permissions for.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T270713 | x_refsource_MISC | |
https://www.debian.org/security/2021/dsa-4889 | vendor-advisory, x_refsource_DEBIAN | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/26UJGHF7LJDOCQN6A3Z4PM7PYRKENJHE/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2OMSV7B2TCFBOCICN3B4SMQP5HVRJQIT/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.debian.org/debian-lts-announce/2021/05/msg00003.html | mailing-list, x_refsource_MLIST | |
https://lists.debian.org/debian-lts-announce/2021/05/msg00006.html | mailing-list, x_refsource_MLIST | |
https://security.gentoo.org/glsa/202107-40 | vendor-advisory, x_refsource_GENTOO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T22:24:59.627Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T270713" }, { "name": "DSA-4889", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2021/dsa-4889" }, { "name": "FEDORA-2021-f4223b6684", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/26UJGHF7LJDOCQN6A3Z4PM7PYRKENJHE/" }, { "name": "FEDORA-2021-d298103d3a", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2OMSV7B2TCFBOCICN3B4SMQP5HVRJQIT/" }, { "name": "[debian-lts-announce] 20210505 [SECURITY] [DLA 2648-1] mediawiki security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00003.html" }, { "name": "[debian-lts-announce] 20210506 [SECURITY] [DLA 2648-2] mediawiki regression update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00006.html" }, { "name": "GLSA-202107-40", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202107-40" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MediaWiki before 1.31.13 and 1.32.x through 1.35.x before 1.35.2. When using the MediaWiki API to \"protect\" a page, a user is currently able to protect to a higher level than they currently have permissions for." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-17T07:06:32", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T270713" }, { "name": "DSA-4889", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2021/dsa-4889" }, { "name": "FEDORA-2021-f4223b6684", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/26UJGHF7LJDOCQN6A3Z4PM7PYRKENJHE/" }, { "name": "FEDORA-2021-d298103d3a", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2OMSV7B2TCFBOCICN3B4SMQP5HVRJQIT/" }, { "name": "[debian-lts-announce] 20210505 [SECURITY] [DLA 2648-1] mediawiki security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00003.html" }, { "name": "[debian-lts-announce] 20210506 [SECURITY] [DLA 2648-2] mediawiki regression update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00006.html" }, { "name": "GLSA-202107-40", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202107-40" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-30152", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in MediaWiki before 1.31.13 and 1.32.x through 1.35.x before 1.35.2. When using the MediaWiki API to \"protect\" a page, a user is currently able to protect to a higher level than they currently have permissions for." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T270713", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T270713" }, { "name": "DSA-4889", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4889" }, { "name": "FEDORA-2021-f4223b6684", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/26UJGHF7LJDOCQN6A3Z4PM7PYRKENJHE/" }, { "name": "FEDORA-2021-d298103d3a", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2OMSV7B2TCFBOCICN3B4SMQP5HVRJQIT/" }, { "name": "[debian-lts-announce] 20210505 [SECURITY] [DLA 2648-1] mediawiki security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00003.html" }, { "name": "[debian-lts-announce] 20210506 [SECURITY] [DLA 2648-2] mediawiki regression update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00006.html" }, { "name": "GLSA-202107-40", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202107-40" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-30152", "datePublished": "2021-04-09T06:08:35", "dateReserved": "2021-04-06T00:00:00", "dateUpdated": "2024-08-03T22:24:59.627Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-45374
Vulnerability from cvelistv5
Published
2023-10-09 00:00
Modified
2024-09-19 17:45
Severity ?
EPSS score ?
Summary
An issue was discovered in the SportsTeams extension for MediaWiki before 1.35.12, 1.36.x through 1.39.x before 1.39.5, and 1.40.x before 1.40.1. It does not check for the anti-CSRF edit token in Special:SportsTeamsManager and Special:UpdateFavoriteTeams.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:21:16.640Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T345040" }, { "tags": [ "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/SportsTeams/+/952552/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-45374", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-19T17:44:54.935362Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352 Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-19T17:45:18.791Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the SportsTeams extension for MediaWiki before 1.35.12, 1.36.x through 1.39.x before 1.39.5, and 1.40.x before 1.40.1. It does not check for the anti-CSRF edit token in Special:SportsTeamsManager and Special:UpdateFavoriteTeams." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-09T05:32:21.393570", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T345040" }, { "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/SportsTeams/+/952552/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-45374", "datePublished": "2023-10-09T00:00:00", "dateReserved": "2023-10-09T00:00:00", "dateUpdated": "2024-09-19T17:45:18.791Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-9475
Vulnerability from cvelistv5
Published
2015-01-16 16:00
Modified
2024-08-06 13:47
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in thumb.php in MediaWiki before 1.19.23, 1.2x before 1.22.15, 1.23.x before 1.23.8, and 1.24.x before 1.24.1 allows remote authenticated users to inject arbitrary web script or HTML via a wikitext message.
References
▼ | URL | Tags |
---|---|---|
http://www.debian.org/security/2014/dsa-3110 | vendor-advisory, x_refsource_DEBIAN | |
http://www.openwall.com/lists/oss-security/2015/01/03/13 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2014/12/21/2 | mailing-list, x_refsource_MLIST | |
http://www.mandriva.com/security/advisories?name=MDVSA-2015:006 | vendor-advisory, x_refsource_MANDRIVA | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-December/000173.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:47:41.530Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "DSA-3110", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-3110" }, { "name": "[oss-security] 20150103 Re: CVE Request: Mediawiki security releases 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/01/03/13" }, { "name": "[oss-security] 20141221 CVE Request: Mediawiki security releases 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/12/21/2" }, { "name": "MDVSA-2015:006", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:006" }, { "name": "[MediaWiki-announce] 20141217 MediaWiki Security and Maintenance Releases: 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-December/000173.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-12-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in thumb.php in MediaWiki before 1.19.23, 1.2x before 1.22.15, 1.23.x before 1.23.8, and 1.24.x before 1.24.1 allows remote authenticated users to inject arbitrary web script or HTML via a wikitext message." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-02-04T17:57:00", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "name": "DSA-3110", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-3110" }, { "name": "[oss-security] 20150103 Re: CVE Request: Mediawiki security releases 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/01/03/13" }, { "name": "[oss-security] 20141221 CVE Request: Mediawiki security releases 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/12/21/2" }, { "name": "MDVSA-2015:006", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:006" }, { "name": "[MediaWiki-announce] 20141217 MediaWiki Security and Maintenance Releases: 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-December/000173.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "ID": "CVE-2014-9475", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in thumb.php in MediaWiki before 1.19.23, 1.2x before 1.22.15, 1.23.x before 1.23.8, and 1.24.x before 1.24.1 allows remote authenticated users to inject arbitrary web script or HTML via a wikitext message." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "DSA-3110", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-3110" }, { "name": "[oss-security] 20150103 Re: CVE Request: Mediawiki security releases 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/01/03/13" }, { "name": "[oss-security] 20141221 CVE Request: Mediawiki security releases 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/12/21/2" }, { "name": "MDVSA-2015:006", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:006" }, { "name": "[MediaWiki-announce] 20141217 MediaWiki Security and Maintenance Releases: 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-December/000173.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2014-9475", "datePublished": "2015-01-16T16:00:00", "dateReserved": "2015-01-03T00:00:00", "dateUpdated": "2024-08-06T13:47:41.530Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-4573
Vulnerability from cvelistv5
Published
2013-11-25 19:00
Modified
2024-08-06 16:45
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in the ZeroRatedMobileAccess extension for MediaWiki 1.19.x before 1.19.9, 1.20.x before 1.20.8, and 1.21.x before 1.21.3 allows remote attackers to inject arbitrary web script or HTML via the "to" parameter to index.php.
References
▼ | URL | Tags |
---|---|---|
https://bugzilla.wikimedia.org/show_bug.cgi?id=55991 | x_refsource_CONFIRM | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-November/000135.html | mailing-list, x_refsource_MLIST | |
http://secunia.com/advisories/55754 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:45:14.876Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=55991" }, { "name": "[MediaWiki-announce] 20131114 MediaWiki Security Release: 1.21.3, 1.20.8 and 1.19.9", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-November/000135.html" }, { "name": "55754", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/55754" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-11-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the ZeroRatedMobileAccess extension for MediaWiki 1.19.x before 1.19.9, 1.20.x before 1.20.8, and 1.21.x before 1.21.3 allows remote attackers to inject arbitrary web script or HTML via the \"to\" parameter to index.php." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-12-01T17:26:34", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=55991" }, { "name": "[MediaWiki-announce] 20131114 MediaWiki Security Release: 1.21.3, 1.20.8 and 1.19.9", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-November/000135.html" }, { "name": "55754", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/55754" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4573", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the ZeroRatedMobileAccess extension for MediaWiki 1.19.x before 1.19.9, 1.20.x before 1.20.8, and 1.21.x before 1.21.3 allows remote attackers to inject arbitrary web script or HTML via the \"to\" parameter to index.php." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.wikimedia.org/show_bug.cgi?id=55991", "refsource": "CONFIRM", "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=55991" }, { "name": "[MediaWiki-announce] 20131114 MediaWiki Security Release: 1.21.3, 1.20.8 and 1.19.9", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-November/000135.html" }, { "name": "55754", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/55754" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-4573", "datePublished": "2013-11-25T19:00:00", "dateReserved": "2013-06-12T00:00:00", "dateUpdated": "2024-08-06T16:45:14.876Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-42047
Vulnerability from cvelistv5
Published
2021-10-06 20:48
Modified
2024-08-04 03:22
Severity ?
EPSS score ?
Summary
An issue was discovered in the Growth extension in MediaWiki through 1.36.2. On any Wiki with the Mentor Dashboard feature enabled, users can login with a mentor account and trigger an XSS payload (such as alert) via Growthexperiments-mentor-dashboard-mentee-overview-no-js-fallback.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T289063 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/c/mediawiki/extensions/GrowthExperiments/+/720088 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:22:25.844Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T289063" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/GrowthExperiments/+/720088" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the Growth extension in MediaWiki through 1.36.2. On any Wiki with the Mentor Dashboard feature enabled, users can login with a mentor account and trigger an XSS payload (such as alert) via Growthexperiments-mentor-dashboard-mentee-overview-no-js-fallback." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-29T16:39:13", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T289063" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/GrowthExperiments/+/720088" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-42047", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in the Growth extension in MediaWiki through 1.36.2. On any Wiki with the Mentor Dashboard feature enabled, users can login with a mentor account and trigger an XSS payload (such as alert) via Growthexperiments-mentor-dashboard-mentee-overview-no-js-fallback." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T289063", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T289063" }, { "name": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/GrowthExperiments/+/720088", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/GrowthExperiments/+/720088" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-42047", "datePublished": "2021-10-06T20:48:01", "dateReserved": "2021-10-06T00:00:00", "dateUpdated": "2024-08-04T03:22:25.844Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-31553
Vulnerability from cvelistv5
Published
2021-04-22 02:29
Modified
2024-08-03 23:03
Severity ?
EPSS score ?
Summary
An issue was discovered in the CheckUser extension for MediaWiki through 1.35.2. MediaWiki usernames with trailing whitespace could be stored in the cu_log database table such that denial of service occurred for certain CheckUser extension pages and functionality. For example, the attacker could turn off Special:CheckUserLog and thus interfere with usage tracking.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T275669 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CheckUser/+/667023 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CheckUser/+/667024 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CheckUser/+/667025 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CheckUser/+/667027 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CheckUser/+/666963 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CheckUser/+/666964 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:03:33.430Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T275669" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CheckUser/+/667023" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CheckUser/+/667024" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CheckUser/+/667025" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CheckUser/+/667027" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CheckUser/+/666963" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CheckUser/+/666964" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the CheckUser extension for MediaWiki through 1.35.2. MediaWiki usernames with trailing whitespace could be stored in the cu_log database table such that denial of service occurred for certain CheckUser extension pages and functionality. For example, the attacker could turn off Special:CheckUserLog and thus interfere with usage tracking." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-22T02:29:31", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T275669" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CheckUser/+/667023" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CheckUser/+/667024" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CheckUser/+/667025" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CheckUser/+/667027" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CheckUser/+/666963" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CheckUser/+/666964" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-31553", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in the CheckUser extension for MediaWiki through 1.35.2. MediaWiki usernames with trailing whitespace could be stored in the cu_log database table such that denial of service occurred for certain CheckUser extension pages and functionality. For example, the attacker could turn off Special:CheckUserLog and thus interfere with usage tracking." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T275669", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T275669" }, { "name": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CheckUser/+/667023", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CheckUser/+/667023" }, { "name": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CheckUser/+/667024", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CheckUser/+/667024" }, { "name": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CheckUser/+/667025", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CheckUser/+/667025" }, { "name": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CheckUser/+/667027", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CheckUser/+/667027" }, { "name": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CheckUser/+/666963", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CheckUser/+/666963" }, { "name": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CheckUser/+/666964", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CheckUser/+/666964" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-31553", "datePublished": "2021-04-22T02:29:31", "dateReserved": "2021-04-22T00:00:00", "dateUpdated": "2024-08-03T23:03:33.430Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-4589
Vulnerability from cvelistv5
Published
2010-01-07 18:13
Modified
2024-08-07 07:08
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in the Special:Block implementation in the getContribsLink function in SpecialBlockip.php in MediaWiki 1.14.0 and 1.15.0 allows remote attackers to inject arbitrary web script or HTML via the ip parameter.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/35662 | vdb-entry, x_refsource_BID | |
http://osvdb.org/55824 | vdb-entry, x_refsource_OSVDB | |
http://secunia.com/advisories/35818 | third-party-advisory, x_refsource_SECUNIA | |
https://bugzilla.wikimedia.org/show_bug.cgi?id=19693 | x_refsource_CONFIRM | |
http://www.vupen.com/english/advisories/2009/1882 | vdb-entry, x_refsource_VUPEN | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/51687 | vdb-entry, x_refsource_XF | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2009-July/000087.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T07:08:38.047Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "35662", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/35662" }, { "name": "55824", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/55824" }, { "name": "35818", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35818" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=19693" }, { "name": "ADV-2009-1882", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1882" }, { "name": "mediawiki-specialblocks-xss(51687)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51687" }, { "name": "[mediawiki-announce] 20090713 MediaWiki security update: 1.15.1 and 1.14.1", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2009-July/000087.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-07-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the Special:Block implementation in the getContribsLink function in SpecialBlockip.php in MediaWiki 1.14.0 and 1.15.0 allows remote attackers to inject arbitrary web script or HTML via the ip parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "35662", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/35662" }, { "name": "55824", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/55824" }, { "name": "35818", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35818" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=19693" }, { "name": "ADV-2009-1882", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1882" }, { "name": "mediawiki-specialblocks-xss(51687)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51687" }, { "name": "[mediawiki-announce] 20090713 MediaWiki security update: 1.15.1 and 1.14.1", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2009-July/000087.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-4589", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the Special:Block implementation in the getContribsLink function in SpecialBlockip.php in MediaWiki 1.14.0 and 1.15.0 allows remote attackers to inject arbitrary web script or HTML via the ip parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "35662", "refsource": "BID", "url": "http://www.securityfocus.com/bid/35662" }, { "name": "55824", "refsource": "OSVDB", "url": "http://osvdb.org/55824" }, { "name": "35818", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35818" }, { "name": "https://bugzilla.wikimedia.org/show_bug.cgi?id=19693", "refsource": "CONFIRM", "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=19693" }, { "name": "ADV-2009-1882", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1882" }, { "name": "mediawiki-specialblocks-xss(51687)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51687" }, { "name": "[mediawiki-announce] 20090713 MediaWiki security update: 1.15.1 and 1.14.1", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2009-July/000087.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-4589", "datePublished": "2010-01-07T18:13:00", "dateReserved": "2010-01-07T00:00:00", "dateUpdated": "2024-08-07T07:08:38.047Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-8001
Vulnerability from cvelistv5
Published
2015-11-09 18:00
Modified
2024-08-06 08:06
Severity ?
EPSS score ?
Summary
The chunked upload API (ApiUpload) in MediaWiki before 1.23.11, 1.24.x before 1.24.4, and 1.25.x before 1.25.3 does not restrict the uploaded data to the claimed file size, which allows remote authenticated users to cause a denial of service via a chunk that exceeds the file size.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1034028 | vdb-entry, x_refsource_SECTRACK | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-October/000181.html | mailing-list, x_refsource_MLIST | |
https://phabricator.wikimedia.org/T91203 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:06:31.520Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1034028", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1034028" }, { "name": "[MediaWiki-announce] 20151016 Security Release: 1.25.3, 1.24.4 and 1.23.11", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-October/000181.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T91203" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-10-16T00:00:00", "descriptions": [ { "lang": "en", "value": "The chunked upload API (ApiUpload) in MediaWiki before 1.23.11, 1.24.x before 1.24.4, and 1.25.x before 1.25.3 does not restrict the uploaded data to the claimed file size, which allows remote authenticated users to cause a denial of service via a chunk that exceeds the file size." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-11-09T17:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1034028", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1034028" }, { "name": "[MediaWiki-announce] 20151016 Security Release: 1.25.3, 1.24.4 and 1.23.11", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-October/000181.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T91203" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-8001", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The chunked upload API (ApiUpload) in MediaWiki before 1.23.11, 1.24.x before 1.24.4, and 1.25.x before 1.25.3 does not restrict the uploaded data to the claimed file size, which allows remote authenticated users to cause a denial of service via a chunk that exceeds the file size." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1034028", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034028" }, { "name": "[MediaWiki-announce] 20151016 Security Release: 1.25.3, 1.24.4 and 1.23.11", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-October/000181.html" }, { "name": "https://phabricator.wikimedia.org/T91203", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T91203" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-8001", "datePublished": "2015-11-09T18:00:00", "dateReserved": "2015-10-28T00:00:00", "dateUpdated": "2024-08-06T08:06:31.520Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-31552
Vulnerability from cvelistv5
Published
2021-04-22 02:29
Modified
2024-08-03 23:03
Severity ?
EPSS score ?
Summary
An issue was discovered in the AbuseFilter extension for MediaWiki through 1.35.2. It incorrectly executed certain rules related to blocking accounts after account creation. Such rules would allow for user accounts to be created while blocking only the IP address used to create an account (and not the user account itself). Such rules could also be used by a nefarious, unprivileged user to catalog and enumerate any number of IP addresses related to these account creations.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T152394 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/I8bae477ad7e4d0190335363ac2decf28e4313da1 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:03:33.164Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T152394" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/I8bae477ad7e4d0190335363ac2decf28e4313da1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the AbuseFilter extension for MediaWiki through 1.35.2. It incorrectly executed certain rules related to blocking accounts after account creation. Such rules would allow for user accounts to be created while blocking only the IP address used to create an account (and not the user account itself). Such rules could also be used by a nefarious, unprivileged user to catalog and enumerate any number of IP addresses related to these account creations." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-22T02:29:41", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T152394" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/I8bae477ad7e4d0190335363ac2decf28e4313da1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-31552", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in the AbuseFilter extension for MediaWiki through 1.35.2. It incorrectly executed certain rules related to blocking accounts after account creation. Such rules would allow for user accounts to be created while blocking only the IP address used to create an account (and not the user account itself). Such rules could also be used by a nefarious, unprivileged user to catalog and enumerate any number of IP addresses related to these account creations." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T152394", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T152394" }, { "name": "https://gerrit.wikimedia.org/r/q/I8bae477ad7e4d0190335363ac2decf28e4313da1", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/I8bae477ad7e4d0190335363ac2decf28e4313da1" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-31552", "datePublished": "2021-04-22T02:29:41", "dateReserved": "2021-04-22T00:00:00", "dateUpdated": "2024-08-03T23:03:33.164Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-6451
Vulnerability from cvelistv5
Published
2020-01-28 14:56
Modified
2024-08-06 17:39
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in MediaWiki 1.19.9 before 1.19.10, 1.2x before 1.21.4, and 1.22.x before 1.22.1 allows remote attackers to inject arbitrary web script or HTML via unspecified CSS values.
References
▼ | URL | Tags |
---|---|---|
http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000138.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Wikimedia Foundation | MediaWiki |
Version: 1.19.9 before 1.19.10 Version: 1.2x before 1.21.4 Version: 1.22.x before 1.22.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T17:39:01.483Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000138.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "MediaWiki", "vendor": "Wikimedia Foundation", "versions": [ { "status": "affected", "version": "1.19.9 before 1.19.10" }, { "status": "affected", "version": "1.2x before 1.21.4" }, { "status": "affected", "version": "1.22.x before 1.22.1" } ] } ], "datePublic": "2014-01-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in MediaWiki 1.19.9 before 1.19.10, 1.2x before 1.21.4, and 1.22.x before 1.22.1 allows remote attackers to inject arbitrary web script or HTML via unspecified CSS values." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-Site Scripting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-01-28T14:56:22", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000138.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-6451", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "MediaWiki", "version": { "version_data": [ { "version_value": "1.19.9 before 1.19.10" }, { "version_value": "1.2x before 1.21.4" }, { "version_value": "1.22.x before 1.22.1" } ] } } ] }, "vendor_name": "Wikimedia Foundation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in MediaWiki 1.19.9 before 1.19.10, 1.2x before 1.21.4, and 1.22.x before 1.22.1 allows remote attackers to inject arbitrary web script or HTML via unspecified CSS values." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross-Site Scripting" } ] } ] }, "references": { "reference_data": [ { "name": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000138.html", "refsource": "MISC", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000138.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-6451", "datePublished": "2020-01-28T14:56:22", "dateReserved": "2013-11-04T00:00:00", "dateUpdated": "2024-08-06T17:39:01.483Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-0047
Vulnerability from cvelistv5
Published
2011-02-04 00:00
Modified
2024-08-06 21:43
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in MediaWiki before 1.16.2 allows remote attackers to inject arbitrary web script or HTML via crafted Cascading Style Sheets (CSS) comments, aka "CSS injection vulnerability."
References
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2011/0273 | vdb-entry, x_refsource_VUPEN | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/65126 | vdb-entry, x_refsource_XF | |
http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059235.html | vendor-advisory, x_refsource_FEDORA | |
http://osvdb.org/70770 | vdb-entry, x_refsource_OSVDB | |
http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058910.html | vendor-advisory, x_refsource_FEDORA | |
https://bugzilla.wikimedia.org/show_bug.cgi?id=27093 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/46108 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/43142 | third-party-advisory, x_refsource_SECUNIA | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-February/000095.html | mailing-list, x_refsource_MLIST | |
http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059232.html | vendor-advisory, x_refsource_FEDORA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:43:14.184Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2011-0273", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0273" }, { "name": "mediawiki-css-comments-xss(65126)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65126" }, { "name": "FEDORA-2011-5807", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059235.html" }, { "name": "70770", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/70770" }, { "name": "FEDORA-2011-5848", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058910.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=27093" }, { "name": "46108", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46108" }, { "name": "43142", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43142" }, { "name": "[MediaWiki-announce] 20110201 MediaWiki security release 1.16.2", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-February/000095.html" }, { "name": "FEDORA-2011-5812", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059232.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-01T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in MediaWiki before 1.16.2 allows remote attackers to inject arbitrary web script or HTML via crafted Cascading Style Sheets (CSS) comments, aka \"CSS injection vulnerability.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2011-0273", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0273" }, { "name": "mediawiki-css-comments-xss(65126)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65126" }, { "name": "FEDORA-2011-5807", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059235.html" }, { "name": "70770", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/70770" }, { "name": "FEDORA-2011-5848", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058910.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=27093" }, { "name": "46108", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46108" }, { "name": "43142", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43142" }, { "name": "[MediaWiki-announce] 20110201 MediaWiki security release 1.16.2", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-February/000095.html" }, { "name": "FEDORA-2011-5812", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059232.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-0047", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in MediaWiki before 1.16.2 allows remote attackers to inject arbitrary web script or HTML via crafted Cascading Style Sheets (CSS) comments, aka \"CSS injection vulnerability.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2011-0273", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0273" }, { "name": "mediawiki-css-comments-xss(65126)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65126" }, { "name": "FEDORA-2011-5807", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059235.html" }, { "name": "70770", "refsource": "OSVDB", "url": "http://osvdb.org/70770" }, { "name": "FEDORA-2011-5848", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058910.html" }, { "name": "https://bugzilla.wikimedia.org/show_bug.cgi?id=27093", "refsource": "CONFIRM", "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=27093" }, { "name": "46108", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46108" }, { "name": "43142", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43142" }, { "name": "[MediaWiki-announce] 20110201 MediaWiki security release 1.16.2", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-February/000095.html" }, { "name": "FEDORA-2011-5812", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059232.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-0047", "datePublished": "2011-02-04T00:00:00", "dateReserved": "2010-12-21T00:00:00", "dateUpdated": "2024-08-06T21:43:14.184Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-7444
Vulnerability from cvelistv5
Published
2015-09-01 14:00
Modified
2024-08-06 18:09
Severity ?
EPSS score ?
Summary
The Special:Contributions page in MediaWiki before 1.22.0 allows remote attackers to determine if an IP is autoblocked via the "Change block" text.
References
▼ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2015/08/27/6 | mailing-list, x_refsource_MLIST | |
https://github.com/wikimedia/mediawiki/commit/dc2966bd05b69321300c63fd0bd78e7c78ecea6e | x_refsource_CONFIRM | |
https://phabricator.wikimedia.org/T48457 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2015/08/12/6 | mailing-list, x_refsource_MLIST | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-August/000179.html | mailing-list, x_refsource_MLIST | |
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165193.html | vendor-advisory, x_refsource_FEDORA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:09:16.877Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20150827 Re: CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/08/27/6" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/wikimedia/mediawiki/commit/dc2966bd05b69321300c63fd0bd78e7c78ecea6e" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T48457" }, { "name": "[oss-security] 20150812 CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/08/12/6" }, { "name": "[MediaWiki-announce] 20150810 MediaWiki Security and Maintenance Releases: 1.25.2, 1.24.3, 1.23.10", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-August/000179.html" }, { "name": "FEDORA-2015-13920", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165193.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-03-22T00:00:00", "descriptions": [ { "lang": "en", "value": "The Special:Contributions page in MediaWiki before 1.22.0 allows remote attackers to determine if an IP is autoblocked via the \"Change block\" text." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-09-01T12:57:03", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[oss-security] 20150827 Re: CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/08/27/6" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/wikimedia/mediawiki/commit/dc2966bd05b69321300c63fd0bd78e7c78ecea6e" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T48457" }, { "name": "[oss-security] 20150812 CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/08/12/6" }, { "name": "[MediaWiki-announce] 20150810 MediaWiki Security and Maintenance Releases: 1.25.2, 1.24.3, 1.23.10", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-August/000179.html" }, { "name": "FEDORA-2015-13920", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165193.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-7444", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Special:Contributions page in MediaWiki before 1.22.0 allows remote attackers to determine if an IP is autoblocked via the \"Change block\" text." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20150827 Re: CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/08/27/6" }, { "name": "https://github.com/wikimedia/mediawiki/commit/dc2966bd05b69321300c63fd0bd78e7c78ecea6e", "refsource": "CONFIRM", "url": "https://github.com/wikimedia/mediawiki/commit/dc2966bd05b69321300c63fd0bd78e7c78ecea6e" }, { "name": "https://phabricator.wikimedia.org/T48457", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T48457" }, { "name": "[oss-security] 20150812 CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/08/12/6" }, { "name": "[MediaWiki-announce] 20150810 MediaWiki Security and Maintenance Releases: 1.25.2, 1.24.3, 1.23.10", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-August/000179.html" }, { "name": "FEDORA-2015-13920", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165193.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-7444", "datePublished": "2015-09-01T14:00:00", "dateReserved": "2015-08-27T00:00:00", "dateUpdated": "2024-08-06T18:09:16.877Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-1579
Vulnerability from cvelistv5
Published
2011-04-27 00:00
Modified
2024-08-06 22:28
Severity ?
EPSS score ?
Summary
The checkCss function in includes/Sanitizer.php in the wikitext parser in MediaWiki before 1.16.3 does not properly validate Cascading Style Sheets (CSS) token sequences, which allows remote attackers to conduct cross-site scripting (XSS) attacks or obtain sensitive information by using the \2f\2a and \2a\2f hex strings to surround CSS comments.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:28:41.908Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "FEDORA-2011-5495", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058588.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=28450" }, { "name": "ADV-2011-0978", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0978" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mediawiki.org/wiki/Special:Code/MediaWiki/85856" }, { "name": "FEDORA-2011-5807", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059235.html" }, { "name": "47354", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/47354" }, { "name": "44142", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44142" }, { "name": "FEDORA-2011-5848", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058910.html" }, { "name": "ADV-2011-1151", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/1151" }, { "name": "mediawiki-css-data-xss(66738)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66738" }, { "name": "DSA-2366", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2366" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=696360" }, { "name": "[mediawiki-announce] 20110412 MediaWiki security release 1.16.3", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-April/000096.html" }, { "name": "ADV-2011-1100", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/1100" }, { "name": "FEDORA-2011-5812", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059232.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=695577" }, { "name": "[oss-security] 20110413 Re: CVE request: mediawiki 1.16.3", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/04/13/15" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "The checkCss function in includes/Sanitizer.php in the wikitext parser in MediaWiki before 1.16.3 does not properly validate Cascading Style Sheets (CSS) token sequences, which allows remote attackers to conduct cross-site scripting (XSS) attacks or obtain sensitive information by using the \\2f\\2a and \\2a\\2f hex strings to surround CSS comments." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "FEDORA-2011-5495", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058588.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=28450" }, { "name": "ADV-2011-0978", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0978" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mediawiki.org/wiki/Special:Code/MediaWiki/85856" }, { "name": "FEDORA-2011-5807", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059235.html" }, { "name": "47354", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/47354" }, { "name": "44142", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44142" }, { "name": "FEDORA-2011-5848", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058910.html" }, { "name": "ADV-2011-1151", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/1151" }, { "name": "mediawiki-css-data-xss(66738)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66738" }, { "name": "DSA-2366", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2366" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=696360" }, { "name": "[mediawiki-announce] 20110412 MediaWiki security release 1.16.3", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-April/000096.html" }, { "name": "ADV-2011-1100", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/1100" }, { "name": "FEDORA-2011-5812", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059232.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=695577" }, { "name": "[oss-security] 20110413 Re: CVE request: mediawiki 1.16.3", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/04/13/15" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-1579", "datePublished": "2011-04-27T00:00:00", "dateReserved": "2011-04-05T00:00:00", "dateUpdated": "2024-08-06T22:28:41.908Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-44858
Vulnerability from cvelistv5
Published
2021-12-20 00:00
Modified
2024-08-04 04:32
Severity ?
EPSS score ?
Summary
An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. It is possible to use action=edit&undo= followed by action=mcrundo and action=mcrrestore to view private pages on a private wiki that has at least one page set in $wgWhitelistRead.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:32:13.331Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T297322" }, { "tags": [ "x_transferred" ], "url": "https://www.mediawiki.org/wiki/2021-12_security_release/FAQ" }, { "name": "GLSA-202305-24", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202305-24" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. It is possible to use action=edit\u0026undo= followed by action=mcrundo and action=mcrrestore to view private pages on a private wiki that has at least one page set in $wgWhitelistRead." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-21T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T297322" }, { "url": "https://www.mediawiki.org/wiki/2021-12_security_release/FAQ" }, { "name": "GLSA-202305-24", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202305-24" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-44858", "datePublished": "2021-12-20T00:00:00", "dateReserved": "2021-12-13T00:00:00", "dateUpdated": "2024-08-04T04:32:13.331Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-29002
Vulnerability from cvelistv5
Published
2020-11-24 05:38
Modified
2024-08-04 16:48
Severity ?
EPSS score ?
Summary
includes/CologneBlueTemplate.php in the CologneBlue skin for MediaWiki through 1.35 allows XSS via a qbfind message supplied by an administrator.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T267278 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/Ie798a4f16d0ac2a4871aefeb593d962966aeb6b0 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:48:01.569Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T267278" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/Ie798a4f16d0ac2a4871aefeb593d962966aeb6b0" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "includes/CologneBlueTemplate.php in the CologneBlue skin for MediaWiki through 1.35 allows XSS via a qbfind message supplied by an administrator." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-11-24T05:38:08", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T267278" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/Ie798a4f16d0ac2a4871aefeb593d962966aeb6b0" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-29002", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "includes/CologneBlueTemplate.php in the CologneBlue skin for MediaWiki through 1.35 allows XSS via a qbfind message supplied by an administrator." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T267278", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T267278" }, { "name": "https://gerrit.wikimedia.org/r/q/Ie798a4f16d0ac2a4871aefeb593d962966aeb6b0", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/Ie798a4f16d0ac2a4871aefeb593d962966aeb6b0" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-29002", "datePublished": "2020-11-24T05:38:08", "dateReserved": "2020-11-24T00:00:00", "dateUpdated": "2024-08-04T16:48:01.569Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-2936
Vulnerability from cvelistv5
Published
2015-04-13 14:00
Modified
2024-08-06 05:32
Severity ?
EPSS score ?
Summary
MediaWiki 1.24.x before 1.24.2, when using PBKDF2 for password hashing, allows remote attackers to cause a denial of service (CPU consumption) via a long password.
References
▼ | URL | Tags |
---|---|---|
https://security.gentoo.org/glsa/201510-05 | vendor-advisory, x_refsource_GENTOO | |
https://phabricator.wikimedia.org/T64685 | x_refsource_CONFIRM | |
http://www.mandriva.com/security/advisories?name=MDVSA-2015:200 | vendor-advisory, x_refsource_MANDRIVA | |
http://www.securityfocus.com/bid/73477 | vdb-entry, x_refsource_BID | |
http://www.openwall.com/lists/oss-security/2015/04/07/3 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2015/04/01/1 | mailing-list, x_refsource_MLIST | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:32:20.369Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201510-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201510-05" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T64685" }, { "name": "MDVSA-2015:200", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:200" }, { "name": "73477", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/73477" }, { "name": "[oss-security] 20150407 Re: CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/04/07/3" }, { "name": "[oss-security] 20150331 CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/04/01/1" }, { "name": "[MediaWiki-announce] 20150331 MediaWiki Security and Maintenance Releases: 1.19.24, 1.23.9, and 1.24.2", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-03-31T00:00:00", "descriptions": [ { "lang": "en", "value": "MediaWiki 1.24.x before 1.24.2, when using PBKDF2 for password hashing, allows remote attackers to cause a denial of service (CPU consumption) via a long password." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-05T21:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "GLSA-201510-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201510-05" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T64685" }, { "name": "MDVSA-2015:200", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:200" }, { "name": "73477", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/73477" }, { "name": "[oss-security] 20150407 Re: CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/04/07/3" }, { "name": "[oss-security] 20150331 CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/04/01/1" }, { "name": "[MediaWiki-announce] 20150331 MediaWiki Security and Maintenance Releases: 1.19.24, 1.23.9, and 1.24.2", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-2936", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MediaWiki 1.24.x before 1.24.2, when using PBKDF2 for password hashing, allows remote attackers to cause a denial of service (CPU consumption) via a long password." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201510-05", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201510-05" }, { "name": "https://phabricator.wikimedia.org/T64685", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T64685" }, { "name": "MDVSA-2015:200", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:200" }, { "name": "73477", "refsource": "BID", "url": "http://www.securityfocus.com/bid/73477" }, { "name": "[oss-security] 20150407 Re: CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/04/07/3" }, { "name": "[oss-security] 20150331 CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/04/01/1" }, { "name": "[MediaWiki-announce] 20150331 MediaWiki Security and Maintenance Releases: 1.19.24, 1.23.9, and 1.24.2", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-2936", "datePublished": "2015-04-13T14:00:00", "dateReserved": "2015-04-07T00:00:00", "dateUpdated": "2024-08-06T05:32:20.369Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36131
Vulnerability from cvelistv5
Published
2021-07-02 13:00
Modified
2024-08-04 00:47
Severity ?
EPSS score ?
Summary
An XSS issue was discovered in the SportsTeams extension in MediaWiki through 1.36. Within several special pages, a privileged user could inject arbitrary HTML and JavaScript within various data fields. The attack could easily propagate across many pages for many users.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T281196 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/Ic312cc9b8463c8e7c3298a661abfcff2cc2332cb | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:47:43.800Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T281196" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/Ic312cc9b8463c8e7c3298a661abfcff2cc2332cb" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An XSS issue was discovered in the SportsTeams extension in MediaWiki through 1.36. Within several special pages, a privileged user could inject arbitrary HTML and JavaScript within various data fields. The attack could easily propagate across many pages for many users." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-02T13:00:06", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T281196" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/Ic312cc9b8463c8e7c3298a661abfcff2cc2332cb" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-36131", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An XSS issue was discovered in the SportsTeams extension in MediaWiki through 1.36. Within several special pages, a privileged user could inject arbitrary HTML and JavaScript within various data fields. The attack could easily propagate across many pages for many users." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T281196", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T281196" }, { "name": "https://gerrit.wikimedia.org/r/q/Ic312cc9b8463c8e7c3298a661abfcff2cc2332cb", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/Ic312cc9b8463c8e7c3298a661abfcff2cc2332cb" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-36131", "datePublished": "2021-07-02T13:00:06", "dateReserved": "2021-07-02T00:00:00", "dateUpdated": "2024-08-04T00:47:43.800Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-23171
Vulnerability from cvelistv5
Published
2024-01-12 00:00
Modified
2024-08-01 22:59
Severity ?
EPSS score ?
Summary
An issue was discovered in the CampaignEvents extension in MediaWiki before 1.35.14, 1.36.x through 1.39.x before 1.39.6, and 1.40.x before 1.40.2. The Special:EventDetails page allows XSS via the x-xss language setting for internationalization (i18n).
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T22:59:31.305Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T348343" }, { "tags": [ "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/I70d71c409193e904684dfb706d424b0a815fa6f6" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the CampaignEvents extension in MediaWiki before 1.35.14, 1.36.x through 1.39.x before 1.39.6, and 1.40.x before 1.40.2. The Special:EventDetails page allows XSS via the x-xss language setting for internationalization (i18n)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-12T04:40:13.720196", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T348343" }, { "url": "https://gerrit.wikimedia.org/r/q/I70d71c409193e904684dfb706d424b0a815fa6f6" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-23171", "datePublished": "2024-01-12T00:00:00", "dateReserved": "2024-01-12T00:00:00", "dateUpdated": "2024-08-01T22:59:31.305Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-6727
Vulnerability from cvelistv5
Published
2015-09-01 14:00
Modified
2024-08-06 07:29
Severity ?
EPSS score ?
Summary
The Special:DeletedContributions page in MediaWiki before 1.23.10, 1.24.x before 1.24.3, and 1.25.x before 1.25.2 allows remote attackers to determine if an IP is autoblocked via the "Change block" text.
References
▼ | URL | Tags |
---|---|---|
https://github.com/wikimedia/mediawiki/commit/5faabfa1bbf65536ea36108887040198afcb3c82 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2015/08/27/6 | mailing-list, x_refsource_MLIST | |
https://phabricator.wikimedia.org/T106893 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2015/08/12/6 | mailing-list, x_refsource_MLIST | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-August/000179.html | mailing-list, x_refsource_MLIST | |
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165193.html | vendor-advisory, x_refsource_FEDORA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:29:24.794Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/wikimedia/mediawiki/commit/5faabfa1bbf65536ea36108887040198afcb3c82" }, { "name": "[oss-security] 20150827 Re: CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/08/27/6" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T106893" }, { "name": "[oss-security] 20150812 CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/08/12/6" }, { "name": "[MediaWiki-announce] 20150810 MediaWiki Security and Maintenance Releases: 1.25.2, 1.24.3, 1.23.10", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-August/000179.html" }, { "name": "FEDORA-2015-13920", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165193.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-08-10T00:00:00", "descriptions": [ { "lang": "en", "value": "The Special:DeletedContributions page in MediaWiki before 1.23.10, 1.24.x before 1.24.3, and 1.25.x before 1.25.2 allows remote attackers to determine if an IP is autoblocked via the \"Change block\" text." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-09-01T12:57:03", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/wikimedia/mediawiki/commit/5faabfa1bbf65536ea36108887040198afcb3c82" }, { "name": "[oss-security] 20150827 Re: CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/08/27/6" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T106893" }, { "name": "[oss-security] 20150812 CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/08/12/6" }, { "name": "[MediaWiki-announce] 20150810 MediaWiki Security and Maintenance Releases: 1.25.2, 1.24.3, 1.23.10", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-August/000179.html" }, { "name": "FEDORA-2015-13920", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165193.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-6727", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Special:DeletedContributions page in MediaWiki before 1.23.10, 1.24.x before 1.24.3, and 1.25.x before 1.25.2 allows remote attackers to determine if an IP is autoblocked via the \"Change block\" text." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/wikimedia/mediawiki/commit/5faabfa1bbf65536ea36108887040198afcb3c82", "refsource": "CONFIRM", "url": "https://github.com/wikimedia/mediawiki/commit/5faabfa1bbf65536ea36108887040198afcb3c82" }, { "name": "[oss-security] 20150827 Re: CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/08/27/6" }, { "name": "https://phabricator.wikimedia.org/T106893", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T106893" }, { "name": "[oss-security] 20150812 CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/08/12/6" }, { "name": "[MediaWiki-announce] 20150810 MediaWiki Security and Maintenance Releases: 1.25.2, 1.24.3, 1.23.10", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-August/000179.html" }, { "name": "FEDORA-2015-13920", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165193.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-6727", "datePublished": "2015-09-01T14:00:00", "dateReserved": "2015-08-27T00:00:00", "dateUpdated": "2024-08-06T07:29:24.794Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41765
Vulnerability from cvelistv5
Published
2022-12-26 00:00
Modified
2024-08-03 12:49
Severity ?
EPSS score ?
Summary
An issue was discovered in MediaWiki before 1.35.8, 1.36.x and 1.37.x before 1.37.5, and 1.38.x before 1.38.3. HTMLUserTextField exposes the existence of hidden users.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:49:43.832Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T309894" }, { "tags": [ "x_transferred" ], "url": "https://security.gentoo.org/glsa/202305-24" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "unknown", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MediaWiki before 1.35.8, 1.36.x and 1.37.x before 1.37.5, and 1.38.x before 1.38.3. HTMLUserTextField exposes the existence of hidden users." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-26T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T309894" }, { "url": "https://security.gentoo.org/glsa/202305-24" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-41765", "datePublished": "2022-12-26T00:00:00", "dateReserved": "2022-09-29T00:00:00", "dateUpdated": "2024-08-03T12:49:43.832Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-1498
Vulnerability from cvelistv5
Published
2006-03-30 00:00
Modified
2024-08-07 17:12
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in MediaWiki before 1.5.8 and 1.4.15 allows remote attackers to inject arbitrary web script or HTML via crafted encoded links.
References
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2006/1194 | vdb-entry, x_refsource_VUPEN | |
http://www.gentoo.org/security/en/glsa/glsa-200604-01.xml | vendor-advisory, x_refsource_GENTOO | |
http://mail.wikipedia.org/pipermail/mediawiki-announce/2006-March/000040.html | mailing-list, x_refsource_MLIST | |
http://www.mediawiki.org/wiki/MediaWiki | x_refsource_CONFIRM | |
http://secunia.com/advisories/19517 | third-party-advisory, x_refsource_SECUNIA | |
http://www.novell.com/linux/security/advisories/2006_07_sr.html | vendor-advisory, x_refsource_SUSE | |
http://www.securityfocus.com/bid/17269 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/25588 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/19508 | third-party-advisory, x_refsource_SECUNIA | |
http://secunia.com/advisories/19504 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T17:12:22.317Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2006-1194", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/1194" }, { "name": "GLSA-200604-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200604-01.xml" }, { "name": "[MediaWiki-announce] 20060327 MediaWiki 1.5.8, 1.4.15 released [SECURITY]", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://mail.wikipedia.org/pipermail/mediawiki-announce/2006-March/000040.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mediawiki.org/wiki/MediaWiki" }, { "name": "19517", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/19517" }, { "name": "SUSE-SR:2006:007", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2006_07_sr.html" }, { "name": "17269", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/17269" }, { "name": "mediawiki-unspecified-xss(25588)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25588" }, { "name": "19508", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/19508" }, { "name": "19504", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/19504" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-03-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in MediaWiki before 1.5.8 and 1.4.15 allows remote attackers to inject arbitrary web script or HTML via crafted encoded links." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2006-1194", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/1194" }, { "name": "GLSA-200604-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200604-01.xml" }, { "name": "[MediaWiki-announce] 20060327 MediaWiki 1.5.8, 1.4.15 released [SECURITY]", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://mail.wikipedia.org/pipermail/mediawiki-announce/2006-March/000040.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mediawiki.org/wiki/MediaWiki" }, { "name": "19517", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/19517" }, { "name": "SUSE-SR:2006:007", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2006_07_sr.html" }, { "name": "17269", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/17269" }, { "name": "mediawiki-unspecified-xss(25588)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25588" }, { "name": "19508", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/19508" }, { "name": "19504", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/19504" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-1498", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in MediaWiki before 1.5.8 and 1.4.15 allows remote attackers to inject arbitrary web script or HTML via crafted encoded links." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2006-1194", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/1194" }, { "name": "GLSA-200604-01", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200604-01.xml" }, { "name": "[MediaWiki-announce] 20060327 MediaWiki 1.5.8, 1.4.15 released [SECURITY]", "refsource": "MLIST", "url": "http://mail.wikipedia.org/pipermail/mediawiki-announce/2006-March/000040.html" }, { "name": "http://www.mediawiki.org/wiki/MediaWiki", "refsource": "CONFIRM", "url": "http://www.mediawiki.org/wiki/MediaWiki" }, { "name": "19517", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/19517" }, { "name": "SUSE-SR:2006:007", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2006_07_sr.html" }, { "name": "17269", "refsource": "BID", "url": "http://www.securityfocus.com/bid/17269" }, { "name": "mediawiki-unspecified-xss(25588)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25588" }, { "name": "19508", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/19508" }, { "name": "19504", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/19504" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-1498", "datePublished": "2006-03-30T00:00:00", "dateReserved": "2006-03-29T00:00:00", "dateUpdated": "2024-08-07T17:12:22.317Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-29137
Vulnerability from cvelistv5
Published
2023-03-31 00:00
Modified
2024-08-02 14:00
Severity ?
EPSS score ?
Summary
An issue was discovered in the GrowthExperiments extension for MediaWiki through 1.39.3. The UserImpactHandler for GrowthExperiments inadvertently returns the timezone preference for arbitrary users, which can be used to de-anonymize users.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T14:00:15.793Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T328643" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the GrowthExperiments extension for MediaWiki through 1.39.3. The UserImpactHandler for GrowthExperiments inadvertently returns the timezone preference for arbitrary users, which can be used to de-anonymize users." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-31T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T328643" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-29137", "datePublished": "2023-03-31T00:00:00", "dateReserved": "2023-03-31T00:00:00", "dateUpdated": "2024-08-02T14:00:15.793Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-40605
Vulnerability from cvelistv5
Published
2024-07-06 00:00
Modified
2024-08-02 04:33
Severity ?
EPSS score ?
Summary
An issue was discovered in the Foreground skin for MediaWiki through 1.42.1. There is stored XSS via MediaWiki:Sidebar top-level menu entries.
References
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mediawiki", "vendor": "mediawiki", "versions": [ { "lessThanOrEqual": "1.42.1", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-40605", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-24T20:21:49.319035Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-24T20:28:46.334Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T04:33:11.987Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T361452" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the Foreground skin for MediaWiki through 1.42.1. There is stored XSS via MediaWiki:Sidebar top-level menu entries." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-06T23:27:19.876020", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T361452" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-40605", "datePublished": "2024-07-06T00:00:00", "dateReserved": "2024-07-06T00:00:00", "dateUpdated": "2024-08-02T04:33:11.987Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36128
Vulnerability from cvelistv5
Published
2021-07-02 13:00
Modified
2024-08-04 00:47
Severity ?
EPSS score ?
Summary
An issue was discovered in the CentralAuth extension in MediaWiki through 1.36. Autoblocks for CentralAuth-issued suppression blocks are not properly implemented.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T281972 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/I3e65690695313380c798b62edfda726b6e374f89 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/I15d14c88a1e30df92c470bc191c4ee573172d4d1 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:47:43.949Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T281972" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/I3e65690695313380c798b62edfda726b6e374f89" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/I15d14c88a1e30df92c470bc191c4ee573172d4d1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the CentralAuth extension in MediaWiki through 1.36. Autoblocks for CentralAuth-issued suppression blocks are not properly implemented." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-02T13:00:45", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T281972" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/I3e65690695313380c798b62edfda726b6e374f89" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/I15d14c88a1e30df92c470bc191c4ee573172d4d1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-36128", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in the CentralAuth extension in MediaWiki through 1.36. Autoblocks for CentralAuth-issued suppression blocks are not properly implemented." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T281972", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T281972" }, { "name": "https://gerrit.wikimedia.org/r/q/I3e65690695313380c798b62edfda726b6e374f89", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/I3e65690695313380c798b62edfda726b6e374f89" }, { "name": "https://gerrit.wikimedia.org/r/q/I15d14c88a1e30df92c470bc191c4ee573172d4d1", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/I15d14c88a1e30df92c470bc191c4ee573172d4d1" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-36128", "datePublished": "2021-07-02T13:00:45", "dateReserved": "2021-07-02T00:00:00", "dateUpdated": "2024-08-04T00:47:43.949Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-31548
Vulnerability from cvelistv5
Published
2021-04-22 02:30
Modified
2024-08-03 23:03
Severity ?
EPSS score ?
Summary
An issue was discovered in the AbuseFilter extension for MediaWiki through 1.35.2. A MediaWiki user who is partially blocked or was unsuccessfully blocked could bypass AbuseFilter and have their edits completed.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T272333 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/Ifac795125927d584a31d95e1b4c4241eef860fa1 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:03:33.388Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T272333" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/Ifac795125927d584a31d95e1b4c4241eef860fa1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the AbuseFilter extension for MediaWiki through 1.35.2. A MediaWiki user who is partially blocked or was unsuccessfully blocked could bypass AbuseFilter and have their edits completed." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-22T02:30:22", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T272333" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/Ifac795125927d584a31d95e1b4c4241eef860fa1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-31548", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in the AbuseFilter extension for MediaWiki through 1.35.2. A MediaWiki user who is partially blocked or was unsuccessfully blocked could bypass AbuseFilter and have their edits completed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T272333", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T272333" }, { "name": "https://gerrit.wikimedia.org/r/q/Ifac795125927d584a31d95e1b4c4241eef860fa1", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/Ifac795125927d584a31d95e1b4c4241eef860fa1" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-31548", "datePublished": "2021-04-22T02:30:22", "dateReserved": "2021-04-22T00:00:00", "dateUpdated": "2024-08-03T23:03:33.388Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2005-4501
Vulnerability from cvelistv5
Published
2005-12-22 21:00
Modified
2024-08-07 23:46
Severity ?
EPSS score ?
Summary
MediaWiki before 1.5.4 uses a hard-coded "internal placeholder string", which allows remote attackers to bypass protection against cross-site scripting (XSS) attacks and execute Javascript using inline style attributes, which are processed by Internet Explorer.
References
▼ | URL | Tags |
---|---|---|
http://www.mediawiki.org/wiki/Download | x_refsource_CONFIRM | |
http://www.vupen.com/english/advisories/2005/3059 | vdb-entry, x_refsource_VUPEN | |
http://secunia.com/advisories/18219 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/23882 | vdb-entry, x_refsource_XF | |
http://lists.suse.com/archive/suse-security-announce/2006-Feb/0001.html | vendor-advisory, x_refsource_SUSE | |
http://www.securityfocus.com/bid/16032 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/18717 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T23:46:05.539Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mediawiki.org/wiki/Download" }, { "name": "ADV-2005-3059", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2005/3059" }, { "name": "18219", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18219" }, { "name": "mediawiki-placeholder-bypass-security(23882)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23882" }, { "name": "SUSE-SR:2006:003", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.suse.com/archive/suse-security-announce/2006-Feb/0001.html" }, { "name": "16032", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/16032" }, { "name": "18717", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18717" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-12-22T00:00:00", "descriptions": [ { "lang": "en", "value": "MediaWiki before 1.5.4 uses a hard-coded \"internal placeholder string\", which allows remote attackers to bypass protection against cross-site scripting (XSS) attacks and execute Javascript using inline style attributes, which are processed by Internet Explorer." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mediawiki.org/wiki/Download" }, { "name": "ADV-2005-3059", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2005/3059" }, { "name": "18219", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18219" }, { "name": "mediawiki-placeholder-bypass-security(23882)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23882" }, { "name": "SUSE-SR:2006:003", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.suse.com/archive/suse-security-announce/2006-Feb/0001.html" }, { "name": "16032", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/16032" }, { "name": "18717", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18717" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-4501", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MediaWiki before 1.5.4 uses a hard-coded \"internal placeholder string\", which allows remote attackers to bypass protection against cross-site scripting (XSS) attacks and execute Javascript using inline style attributes, which are processed by Internet Explorer." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.mediawiki.org/wiki/Download", "refsource": "CONFIRM", "url": "http://www.mediawiki.org/wiki/Download" }, { "name": "ADV-2005-3059", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2005/3059" }, { "name": "18219", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18219" }, { "name": "mediawiki-placeholder-bypass-security(23882)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23882" }, { "name": "SUSE-SR:2006:003", "refsource": "SUSE", "url": "http://lists.suse.com/archive/suse-security-announce/2006-Feb/0001.html" }, { "name": "16032", "refsource": "BID", "url": "http://www.securityfocus.com/bid/16032" }, { "name": "18717", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18717" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-4501", "datePublished": "2005-12-22T21:00:00", "dateReserved": "2005-12-22T00:00:00", "dateUpdated": "2024-08-07T23:46:05.539Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-8809
Vulnerability from cvelistv5
Published
2017-11-15 08:00
Modified
2024-08-05 16:48
Severity ?
EPSS score ?
Summary
api.php in MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2 has a Reflected File Download vulnerability.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1039812 | vdb-entry, x_refsource_SECTRACK | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-November/000216.html | x_refsource_CONFIRM | |
https://www.debian.org/security/2017/dsa-4036 | vendor-advisory, x_refsource_DEBIAN |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2 |
Version: MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T16:48:21.913Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1039812", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039812" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-November/000216.html" }, { "name": "DSA-4036", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2017/dsa-4036" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2", "vendor": "n/a", "versions": [ { "status": "affected", "version": "MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2" } ] } ], "datePublic": "2017-11-15T00:00:00", "descriptions": [ { "lang": "en", "value": "api.php in MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2 has a Reflected File Download vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Reflected File Download", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-16T10:57:01", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "name": "1039812", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039812" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-November/000216.html" }, { "name": "DSA-4036", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2017/dsa-4036" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "ID": "CVE-2017-8809", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2", "version": { "version_data": [ { "version_value": "MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "api.php in MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2 has a Reflected File Download vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Reflected File Download" } ] } ] }, "references": { "reference_data": [ { "name": "1039812", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039812" }, { "name": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-November/000216.html", "refsource": "CONFIRM", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-November/000216.html" }, { "name": "DSA-4036", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2017/dsa-4036" } ] } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2017-8809", "datePublished": "2017-11-15T08:00:00", "dateReserved": "2017-05-07T00:00:00", "dateUpdated": "2024-08-05T16:48:21.913Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-35624
Vulnerability from cvelistv5
Published
2020-12-21 22:36
Modified
2024-08-04 17:09
Severity ?
EPSS score ?
Summary
An issue was discovered in the SecurePoll extension for MediaWiki through 1.35.1. The non-admin vote list contains a full vote timestamp, which may provide unintended clues about how a voting process unfolded.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T268794 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/If8e15eb8ce9ec652c06816cbff52bb084fd50e73 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:09:14.298Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T268794" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/If8e15eb8ce9ec652c06816cbff52bb084fd50e73" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the SecurePoll extension for MediaWiki through 1.35.1. The non-admin vote list contains a full vote timestamp, which may provide unintended clues about how a voting process unfolded." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-21T22:36:51", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T268794" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/If8e15eb8ce9ec652c06816cbff52bb084fd50e73" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-35624", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in the SecurePoll extension for MediaWiki through 1.35.1. The non-admin vote list contains a full vote timestamp, which may provide unintended clues about how a voting process unfolded." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T268794", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T268794" }, { "name": "https://gerrit.wikimedia.org/r/q/If8e15eb8ce9ec652c06816cbff52bb084fd50e73", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/If8e15eb8ce9ec652c06816cbff52bb084fd50e73" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-35624", "datePublished": "2020-12-21T22:36:51", "dateReserved": "2020-12-21T00:00:00", "dateUpdated": "2024-08-04T17:09:14.298Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-1648
Vulnerability from cvelistv5
Published
2010-06-07 20:00
Modified
2024-08-07 01:28
Severity ?
EPSS score ?
Summary
Cross-site request forgery (CSRF) vulnerability in the login interface in MediaWiki 1.15 before 1.15.4 and 1.16 before 1.16 beta 3 allows remote attackers to hijack the authentication of users for requests that (1) create accounts or (2) reset passwords, related to the Special:Userlogin form.
References
▼ | URL | Tags |
---|---|---|
http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043856.html | vendor-advisory, x_refsource_FEDORA | |
https://bugzilla.wikimedia.org/show_bug.cgi?id=23371 | x_refsource_CONFIRM | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2010-May/000091.html | mailing-list, x_refsource_MLIST | |
http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043803.html | vendor-advisory, x_refsource_FEDORA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:28:41.503Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "FEDORA-2010-10848", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043856.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=23371" }, { "name": "[MediaWiki-announce] 20100528 MediaWiki security update: 1.15.4 and 1.16.0beta3", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2010-May/000091.html" }, { "name": "FEDORA-2010-10779", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043803.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-05-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability in the login interface in MediaWiki 1.15 before 1.15.4 and 1.16 before 1.16 beta 3 allows remote attackers to hijack the authentication of users for requests that (1) create accounts or (2) reset passwords, related to the Special:Userlogin form." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-07-30T09:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "FEDORA-2010-10848", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043856.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=23371" }, { "name": "[MediaWiki-announce] 20100528 MediaWiki security update: 1.15.4 and 1.16.0beta3", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2010-May/000091.html" }, { "name": "FEDORA-2010-10779", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043803.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2010-1648", "datePublished": "2010-06-07T20:00:00", "dateReserved": "2010-04-29T00:00:00", "dateUpdated": "2024-08-07T01:28:41.503Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22912
Vulnerability from cvelistv5
Published
2023-01-20 00:00
Modified
2024-08-02 10:20
Severity ?
EPSS score ?
Summary
An issue was discovered in MediaWiki before 1.35.9, 1.36.x through 1.38.x before 1.38.5, and 1.39.x before 1.39.1. CheckUser TokenManager insecurely uses AES-CTR encryption with a repeated (aka re-used) nonce, allowing an adversary to decrypt.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:20:31.456Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T315123" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MediaWiki before 1.35.9, 1.36.x through 1.38.x before 1.38.5, and 1.39.x before 1.39.1. CheckUser TokenManager insecurely uses AES-CTR encryption with a repeated (aka re-used) nonce, allowing an adversary to decrypt." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-20T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T315123" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-22912", "datePublished": "2023-01-20T00:00:00", "dateReserved": "2023-01-10T00:00:00", "dateUpdated": "2024-08-02T10:20:31.456Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-6335
Vulnerability from cvelistv5
Published
2017-04-20 17:00
Modified
2024-08-06 01:29
Severity ?
EPSS score ?
Summary
MediaWiki before 1.23.15, 1.26.x before 1.26.4, and 1.27.x before 1.27.1 does not generate head items in the context of a given title, which allows remote attackers to obtain sensitive information via a parse action to api.php.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T139570 | x_refsource_CONFIRM | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2016-August/000195.html | mailing-list, x_refsource_MLIST | |
https://bugzilla.redhat.com/show_bug.cgi?id=1369613 | x_refsource_CONFIRM | |
https://phabricator.wikimedia.org/T139565 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:29:18.431Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T139570" }, { "name": "[MediaWiki-announce] 20160823 Security Release - 1.27.1, 1.26.4, 1.23.15", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2016-August/000195.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369613" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T139565" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-08-23T00:00:00", "descriptions": [ { "lang": "en", "value": "MediaWiki before 1.23.15, 1.26.x before 1.26.4, and 1.27.x before 1.27.1 does not generate head items in the context of a given title, which allows remote attackers to obtain sensitive information via a parse action to api.php." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-04-20T16:57:02", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T139570" }, { "name": "[MediaWiki-announce] 20160823 Security Release - 1.27.1, 1.26.4, 1.23.15", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2016-August/000195.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369613" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T139565" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-6335", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MediaWiki before 1.23.15, 1.26.x before 1.26.4, and 1.27.x before 1.27.1 does not generate head items in the context of a given title, which allows remote attackers to obtain sensitive information via a parse action to api.php." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T139570", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T139570" }, { "name": "[MediaWiki-announce] 20160823 Security Release - 1.27.1, 1.26.4, 1.23.15", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2016-August/000195.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1369613", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369613" }, { "name": "https://phabricator.wikimedia.org/T139565", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T139565" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-6335", "datePublished": "2017-04-20T17:00:00", "dateReserved": "2016-07-26T00:00:00", "dateUpdated": "2024-08-06T01:29:18.431Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-27957
Vulnerability from cvelistv5
Published
2020-10-28 02:29
Modified
2024-08-04 16:25
Severity ?
EPSS score ?
Summary
The RandomGameUnit extension for MediaWiki through 1.35 was not properly escaping various title-related data. When certain varieties of games were created within MediaWiki, their names or titles could be manipulated to generate stored XSS within the RandomGameUnit extension.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T266400 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/I497d2076038f75c9eb77e0e250f2af56f5bd2bfc | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:25:44.109Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T266400" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/I497d2076038f75c9eb77e0e250f2af56f5bd2bfc" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The RandomGameUnit extension for MediaWiki through 1.35 was not properly escaping various title-related data. When certain varieties of games were created within MediaWiki, their names or titles could be manipulated to generate stored XSS within the RandomGameUnit extension." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-28T02:29:54", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T266400" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/I497d2076038f75c9eb77e0e250f2af56f5bd2bfc" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-27957", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The RandomGameUnit extension for MediaWiki through 1.35 was not properly escaping various title-related data. When certain varieties of games were created within MediaWiki, their names or titles could be manipulated to generate stored XSS within the RandomGameUnit extension." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T266400", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T266400" }, { "name": "https://gerrit.wikimedia.org/r/q/I497d2076038f75c9eb77e0e250f2af56f5bd2bfc", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/I497d2076038f75c9eb77e0e250f2af56f5bd2bfc" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-27957", "datePublished": "2020-10-28T02:29:54", "dateReserved": "2020-10-28T00:00:00", "dateUpdated": "2024-08-04T16:25:44.109Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-1647
Vulnerability from cvelistv5
Published
2010-06-07 20:00
Modified
2024-08-07 01:28
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in MediaWiki 1.15 before 1.15.4 and 1.16 before 1.16 beta 3 allows remote attackers to inject arbitrary web script or HTML via crafted Cascading Style Sheets (CSS) strings that are processed as script by Internet Explorer.
References
▼ | URL | Tags |
---|---|---|
http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043856.html | vendor-advisory, x_refsource_FEDORA | |
https://bugzilla.wikimedia.org/show_bug.cgi?id=23687 | x_refsource_CONFIRM | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2010-May/000091.html | mailing-list, x_refsource_MLIST | |
http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043803.html | vendor-advisory, x_refsource_FEDORA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:28:41.972Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "FEDORA-2010-10848", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043856.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=23687" }, { "name": "[MediaWiki-announce] 20100528 MediaWiki security update: 1.15.4 and 1.16.0beta3", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2010-May/000091.html" }, { "name": "FEDORA-2010-10779", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043803.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-05-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in MediaWiki 1.15 before 1.15.4 and 1.16 before 1.16 beta 3 allows remote attackers to inject arbitrary web script or HTML via crafted Cascading Style Sheets (CSS) strings that are processed as script by Internet Explorer." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-07-30T09:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "FEDORA-2010-10848", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043856.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=23687" }, { "name": "[MediaWiki-announce] 20100528 MediaWiki security update: 1.15.4 and 1.16.0beta3", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2010-May/000091.html" }, { "name": "FEDORA-2010-10779", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043803.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2010-1647", "datePublished": "2010-06-07T20:00:00", "dateReserved": "2010-04-29T00:00:00", "dateUpdated": "2024-08-07T01:28:41.972Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-5250
Vulnerability from cvelistv5
Published
2008-12-19 17:00
Modified
2024-08-07 10:49
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in MediaWiki before 1.6.11, 1.12.x before 1.12.2, and 1.13.x before 1.13.3, when Internet Explorer is used and uploads are enabled, or an SVG scripting browser is used and SVG uploads are enabled, allows remote authenticated users to inject arbitrary web script or HTML by editing a wiki page.
References
▼ | URL | Tags |
---|---|---|
https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01309.html | vendor-advisory, x_refsource_FEDORA | |
http://www.debian.org/security/2009/dsa-1901 | vendor-advisory, x_refsource_DEBIAN | |
http://secunia.com/advisories/33133 | third-party-advisory, x_refsource_SECUNIA | |
http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html | vendor-advisory, x_refsource_SUSE | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2008-December/000080.html | mailing-list, x_refsource_MLIST | |
http://www.securityfocus.com/bid/32844 | vdb-entry, x_refsource_BID | |
https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01256.html | vendor-advisory, x_refsource_FEDORA | |
http://secunia.com/advisories/33349 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T10:49:11.913Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "FEDORA-2008-11802", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01309.html" }, { "name": "DSA-1901", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2009/dsa-1901" }, { "name": "33133", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33133" }, { "name": "SUSE-SR:2009:004", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html" }, { "name": "[mediawiki-announce] 20081215 MediaWiki 1.13.3, 1.12.2, 1.6.11 security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2008-December/000080.html" }, { "name": "32844", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/32844" }, { "name": "FEDORA-2008-11688", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01256.html" }, { "name": "33349", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33349" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-12-15T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in MediaWiki before 1.6.11, 1.12.x before 1.12.2, and 1.13.x before 1.13.3, when Internet Explorer is used and uploads are enabled, or an SVG scripting browser is used and SVG uploads are enabled, allows remote authenticated users to inject arbitrary web script or HTML by editing a wiki page." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-01-01T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "FEDORA-2008-11802", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01309.html" }, { "name": "DSA-1901", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2009/dsa-1901" }, { "name": "33133", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33133" }, { "name": "SUSE-SR:2009:004", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html" }, { "name": "[mediawiki-announce] 20081215 MediaWiki 1.13.3, 1.12.2, 1.6.11 security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2008-December/000080.html" }, { "name": "32844", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/32844" }, { "name": "FEDORA-2008-11688", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01256.html" }, { "name": "33349", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33349" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-5250", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in MediaWiki before 1.6.11, 1.12.x before 1.12.2, and 1.13.x before 1.13.3, when Internet Explorer is used and uploads are enabled, or an SVG scripting browser is used and SVG uploads are enabled, allows remote authenticated users to inject arbitrary web script or HTML by editing a wiki page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "FEDORA-2008-11802", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01309.html" }, { "name": "DSA-1901", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2009/dsa-1901" }, { "name": "33133", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33133" }, { "name": "SUSE-SR:2009:004", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html" }, { "name": "[mediawiki-announce] 20081215 MediaWiki 1.13.3, 1.12.2, 1.6.11 security update", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2008-December/000080.html" }, { "name": "32844", "refsource": "BID", "url": "http://www.securityfocus.com/bid/32844" }, { "name": "FEDORA-2008-11688", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01256.html" }, { "name": "33349", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33349" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-5250", "datePublished": "2008-12-19T17:00:00", "dateReserved": "2008-11-26T00:00:00", "dateUpdated": "2024-08-07T10:49:11.913Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-5243
Vulnerability from cvelistv5
Published
2014-08-22 17:00
Modified
2024-08-06 11:41
Severity ?
EPSS score ?
Summary
MediaWiki before 1.19.18, 1.20.x through 1.22.x before 1.22.9, and 1.23.x before 1.23.2 does not enforce an IFRAME protection mechanism for transcluded pages, which makes it easier for remote attackers to conduct clickjacking attacks via a crafted web site.
References
▼ | URL | Tags |
---|---|---|
https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-July/000157.html | mailing-list, x_refsource_MLIST | |
http://www.debian.org/security/2014/dsa-3011 | vendor-advisory, x_refsource_DEBIAN | |
http://www.mandriva.com/security/advisories?name=MDVSA-2014:153 | vendor-advisory, x_refsource_MANDRIVA | |
http://secunia.com/advisories/59738 | third-party-advisory, x_refsource_SECUNIA | |
http://openwall.com/lists/oss-security/2014/08/14/5 | mailing-list, x_refsource_MLIST | |
https://bugzilla.wikimedia.org/show_bug.cgi?id=65778 | x_refsource_CONFIRM | |
http://advisories.mageia.org/MGASA-2014-0309.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T11:41:48.324Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[MediaWiki-announce] 20140730 MediaWiki Security and Maintenance Releases: 1.19.18, 1.22.9 and 1.23.2", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-July/000157.html" }, { "name": "DSA-3011", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-3011" }, { "name": "MDVSA-2014:153", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:153" }, { "name": "59738", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59738" }, { "name": "[oss-security] 20140814 Re: Possible CVE Request: MediaWiki Security and Maintenance Releases: 1.19.18, 1.22.9 and 1.23.2", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2014/08/14/5" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=65778" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://advisories.mageia.org/MGASA-2014-0309.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-08-01T00:00:00", "descriptions": [ { "lang": "en", "value": "MediaWiki before 1.19.18, 1.20.x through 1.22.x before 1.22.9, and 1.23.x before 1.23.2 does not enforce an IFRAME protection mechanism for transcluded pages, which makes it easier for remote attackers to conduct clickjacking attacks via a crafted web site." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-01-04T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[MediaWiki-announce] 20140730 MediaWiki Security and Maintenance Releases: 1.19.18, 1.22.9 and 1.23.2", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-July/000157.html" }, { "name": "DSA-3011", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-3011" }, { "name": "MDVSA-2014:153", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:153" }, { "name": "59738", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59738" }, { "name": "[oss-security] 20140814 Re: Possible CVE Request: MediaWiki Security and Maintenance Releases: 1.19.18, 1.22.9 and 1.23.2", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2014/08/14/5" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=65778" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://advisories.mageia.org/MGASA-2014-0309.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-5243", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MediaWiki before 1.19.18, 1.20.x through 1.22.x before 1.22.9, and 1.23.x before 1.23.2 does not enforce an IFRAME protection mechanism for transcluded pages, which makes it easier for remote attackers to conduct clickjacking attacks via a crafted web site." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[MediaWiki-announce] 20140730 MediaWiki Security and Maintenance Releases: 1.19.18, 1.22.9 and 1.23.2", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-July/000157.html" }, { "name": "DSA-3011", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-3011" }, { "name": "MDVSA-2014:153", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:153" }, { "name": "59738", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/59738" }, { "name": "[oss-security] 20140814 Re: Possible CVE Request: MediaWiki Security and Maintenance Releases: 1.19.18, 1.22.9 and 1.23.2", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2014/08/14/5" }, { "name": "https://bugzilla.wikimedia.org/show_bug.cgi?id=65778", "refsource": "CONFIRM", "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=65778" }, { "name": "http://advisories.mageia.org/MGASA-2014-0309.html", "refsource": "CONFIRM", "url": "http://advisories.mageia.org/MGASA-2014-0309.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-5243", "datePublished": "2014-08-22T17:00:00", "dateReserved": "2014-08-14T00:00:00", "dateUpdated": "2024-08-06T11:41:48.324Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-4571
Vulnerability from cvelistv5
Published
2014-05-12 14:00
Modified
2024-08-06 16:45
Severity ?
EPSS score ?
Summary
Buffer overflow in php-luasandbox in the Scribuntu extension for MediaWiki before 1.19.10, 1.2x before 1.21.4, and 1.22.x before 1.22.1 has unspecified impact and remote vectors.
References
▼ | URL | Tags |
---|---|---|
http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000138.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:45:14.919Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[MediaWiki-announce] 20140114 MediaWiki Security Releases: 1.22.1, 1.21.4 and 1.19.10", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000138.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-01-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in php-luasandbox in the Scribuntu extension for MediaWiki before 1.19.10, 1.2x before 1.21.4, and 1.22.x before 1.22.1 has unspecified impact and remote vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-05-12T13:57:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[MediaWiki-announce] 20140114 MediaWiki Security Releases: 1.22.1, 1.21.4 and 1.19.10", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000138.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4571", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in php-luasandbox in the Scribuntu extension for MediaWiki before 1.19.10, 1.2x before 1.21.4, and 1.22.x before 1.22.1 has unspecified impact and remote vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[MediaWiki-announce] 20140114 MediaWiki Security Releases: 1.22.1, 1.21.4 and 1.19.10", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000138.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-4571", "datePublished": "2014-05-12T14:00:00", "dateReserved": "2013-06-12T00:00:00", "dateUpdated": "2024-08-06T16:45:14.919Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-42044
Vulnerability from cvelistv5
Published
2021-10-06 20:28
Modified
2024-08-04 03:22
Severity ?
EPSS score ?
Summary
An issue was discovered in the Mentor dashboard in the GrowthExperiments extension in MediaWiki through 1.36.2. The Growthexperiments-mentor-dashboard-mentee-overview-add-filter-total-edits-headline, growthexperiments-mentor-dashboard-mentee-overview-add-filter-starred-headline, growthexperiments-mentor-dashboard-mentee-overview-info-text, growthexperiments-mentor-dashboard-mentee-overview-info-legend-headline, and growthexperiments-mentor-dashboard-mentee-overview-active-ago MediaWiki messages were not being properly sanitized and allowed for the injection and execution of HTML and JavaScript.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T289408 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/I858d55fb2eca9b50ac6ef5a6f2a7b2784f0fa0d6 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:22:25.926Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T289408" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/I858d55fb2eca9b50ac6ef5a6f2a7b2784f0fa0d6" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the Mentor dashboard in the GrowthExperiments extension in MediaWiki through 1.36.2. The Growthexperiments-mentor-dashboard-mentee-overview-add-filter-total-edits-headline, growthexperiments-mentor-dashboard-mentee-overview-add-filter-starred-headline, growthexperiments-mentor-dashboard-mentee-overview-info-text, growthexperiments-mentor-dashboard-mentee-overview-info-legend-headline, and growthexperiments-mentor-dashboard-mentee-overview-active-ago MediaWiki messages were not being properly sanitized and allowed for the injection and execution of HTML and JavaScript." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-06T20:28:07", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T289408" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/I858d55fb2eca9b50ac6ef5a6f2a7b2784f0fa0d6" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-42044", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in the Mentor dashboard in the GrowthExperiments extension in MediaWiki through 1.36.2. The Growthexperiments-mentor-dashboard-mentee-overview-add-filter-total-edits-headline, growthexperiments-mentor-dashboard-mentee-overview-add-filter-starred-headline, growthexperiments-mentor-dashboard-mentee-overview-info-text, growthexperiments-mentor-dashboard-mentee-overview-info-legend-headline, and growthexperiments-mentor-dashboard-mentee-overview-active-ago MediaWiki messages were not being properly sanitized and allowed for the injection and execution of HTML and JavaScript." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T289408", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T289408" }, { "name": "https://gerrit.wikimedia.org/r/q/I858d55fb2eca9b50ac6ef5a6f2a7b2784f0fa0d6", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/I858d55fb2eca9b50ac6ef5a6f2a7b2784f0fa0d6" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-42044", "datePublished": "2021-10-06T20:28:07", "dateReserved": "2021-10-06T00:00:00", "dateUpdated": "2024-08-04T03:22:25.926Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-9277
Vulnerability from cvelistv5
Published
2015-01-04 21:00
Modified
2024-08-06 13:40
Severity ?
EPSS score ?
Summary
The wfMangleFlashPolicy function in OutputHandler.php in MediaWiki before 1.19.22, 1.20.x through 1.22.x before 1.22.14, and 1.23.x before 1.23.7 allows remote attackers to conduct PHP object injection attacks via a crafted string containing <cross-domain-policy> in a PHP format request, which causes the string length to change when converting the request to <NOT-cross-domain-policy>.
References
▼ | URL | Tags |
---|---|---|
http://securitytracker.com/id?1031301 | vdb-entry, x_refsource_SECTRACK | |
https://phabricator.wikimedia.org/T73478 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2014/12/03/9 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2014/12/04/16 | mailing-list, x_refsource_MLIST | |
http://www.debian.org/security/2014/dsa-3100 | vendor-advisory, x_refsource_DEBIAN | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-November/000170.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:40:24.904Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1031301", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1031301" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T73478" }, { "name": "[oss-security] 20141203 MediaWiki security release - 1.23.7", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/12/03/9" }, { "name": "[oss-security] 20141204 Re: MediaWiki security release - 1.23.7", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/12/04/16" }, { "name": "DSA-3100", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-3100" }, { "name": "[MediaWiki-announce] 20141127 MediaWiki Security and Maintenance Releases: 1.23.7, 1.22.14 and 1.19.22", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-November/000170.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-11-27T00:00:00", "descriptions": [ { "lang": "en", "value": "The wfMangleFlashPolicy function in OutputHandler.php in MediaWiki before 1.19.22, 1.20.x through 1.22.x before 1.22.14, and 1.23.x before 1.23.7 allows remote attackers to conduct PHP object injection attacks via a crafted string containing \u003ccross-domain-policy\u003e in a PHP format request, which causes the string length to change when converting the request to \u003cNOT-cross-domain-policy\u003e." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-01-04T20:57:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1031301", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1031301" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T73478" }, { "name": "[oss-security] 20141203 MediaWiki security release - 1.23.7", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/12/03/9" }, { "name": "[oss-security] 20141204 Re: MediaWiki security release - 1.23.7", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/12/04/16" }, { "name": "DSA-3100", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-3100" }, { "name": "[MediaWiki-announce] 20141127 MediaWiki Security and Maintenance Releases: 1.23.7, 1.22.14 and 1.19.22", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-November/000170.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-9277", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The wfMangleFlashPolicy function in OutputHandler.php in MediaWiki before 1.19.22, 1.20.x through 1.22.x before 1.22.14, and 1.23.x before 1.23.7 allows remote attackers to conduct PHP object injection attacks via a crafted string containing \u003ccross-domain-policy\u003e in a PHP format request, which causes the string length to change when converting the request to \u003cNOT-cross-domain-policy\u003e." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1031301", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1031301" }, { "name": "https://phabricator.wikimedia.org/T73478", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T73478" }, { "name": "[oss-security] 20141203 MediaWiki security release - 1.23.7", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/12/03/9" }, { "name": "[oss-security] 20141204 Re: MediaWiki security release - 1.23.7", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/12/04/16" }, { "name": "DSA-3100", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-3100" }, { "name": "[MediaWiki-announce] 20141127 MediaWiki Security and Maintenance Releases: 1.23.7, 1.22.14 and 1.19.22", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-November/000170.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-9277", "datePublished": "2015-01-04T21:00:00", "dateReserved": "2014-12-04T00:00:00", "dateUpdated": "2024-08-06T13:40:24.904Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-1318
Vulnerability from cvelistv5
Published
2008-03-13 14:00
Modified
2024-08-07 08:17
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in MediaWiki 1.11 before 1.11.2 allows remote attackers to obtain sensitive "cross-site" information via the callback parameter in an API call for JavaScript Object Notation (JSON) formatted results.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/28070 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/29216 | third-party-advisory, x_refsource_SECUNIA | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2008-March/000070.html | mailing-list, x_refsource_MLIST | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/40960 | vdb-entry, x_refsource_XF | |
http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_11_2/phase3/RELEASE-NOTES | x_refsource_CONFIRM | |
http://www.securitytracker.com/id?1019535 | vdb-entry, x_refsource_SECTRACK | |
http://www.vupen.com/english/advisories/2008/0732/references | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:17:34.296Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "28070", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28070" }, { "name": "29216", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29216" }, { "name": "[MediaWiki-announce] 20080307 MediaWiki 1.11.2 released (security)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2008-March/000070.html" }, { "name": "mediawiki-jsoncallbacks-info-disclosure(40960)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40960" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_11_2/phase3/RELEASE-NOTES" }, { "name": "1019535", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019535" }, { "name": "ADV-2008-0732", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0732/references" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-03-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in MediaWiki 1.11 before 1.11.2 allows remote attackers to obtain sensitive \"cross-site\" information via the callback parameter in an API call for JavaScript Object Notation (JSON) formatted results." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-07T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "28070", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28070" }, { "name": "29216", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29216" }, { "name": "[MediaWiki-announce] 20080307 MediaWiki 1.11.2 released (security)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2008-March/000070.html" }, { "name": "mediawiki-jsoncallbacks-info-disclosure(40960)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40960" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_11_2/phase3/RELEASE-NOTES" }, { "name": "1019535", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019535" }, { "name": "ADV-2008-0732", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0732/references" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-1318", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in MediaWiki 1.11 before 1.11.2 allows remote attackers to obtain sensitive \"cross-site\" information via the callback parameter in an API call for JavaScript Object Notation (JSON) formatted results." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "28070", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28070" }, { "name": "29216", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29216" }, { "name": "[MediaWiki-announce] 20080307 MediaWiki 1.11.2 released (security)", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2008-March/000070.html" }, { "name": "mediawiki-jsoncallbacks-info-disclosure(40960)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40960" }, { "name": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_11_2/phase3/RELEASE-NOTES", "refsource": "CONFIRM", "url": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_11_2/phase3/RELEASE-NOTES" }, { "name": "1019535", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019535" }, { "name": "ADV-2008-0732", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0732/references" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-1318", "datePublished": "2008-03-13T14:00:00", "dateReserved": "2008-03-13T00:00:00", "dateUpdated": "2024-08-07T08:17:34.296Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-4883
Vulnerability from cvelistv5
Published
2007-09-14 00:00
Modified
2024-08-07 15:08
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in the BotQuery extension in MediaWiki 1.7.x and earlier before SVN 20070910 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a similar issue to CVE-2007-4828.
References
▼ | URL | Tags |
---|---|---|
http://osvdb.org/37336 | vdb-entry, x_refsource_OSVDB | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2007-September/000067.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:08:33.755Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "37336", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/37336" }, { "name": "[MediaWiki-announce] 20070910 MediaWiki 1.11.0, 1.10.2, 1.9.4, 1.8.5 released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2007-September/000067.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-09-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the BotQuery extension in MediaWiki 1.7.x and earlier before SVN 20070910 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a similar issue to CVE-2007-4828." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2008-11-15T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "37336", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/37336" }, { "name": "[MediaWiki-announce] 20070910 MediaWiki 1.11.0, 1.10.2, 1.9.4, 1.8.5 released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2007-September/000067.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-4883", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the BotQuery extension in MediaWiki 1.7.x and earlier before SVN 20070910 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a similar issue to CVE-2007-4828." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "37336", "refsource": "OSVDB", "url": "http://osvdb.org/37336" }, { "name": "[MediaWiki-announce] 20070910 MediaWiki 1.11.0, 1.10.2, 1.9.4, 1.8.5 released", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2007-September/000067.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-4883", "datePublished": "2007-09-14T00:00:00", "dateReserved": "2007-09-13T00:00:00", "dateUpdated": "2024-08-07T15:08:33.755Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-4572
Vulnerability from cvelistv5
Published
2020-02-06 14:40
Modified
2024-08-06 16:45
Severity ?
EPSS score ?
Summary
The CentralNotice extension for MediaWiki before 1.19.9, 1.20.x before 1.20.8, and 1.21.x before 1.21.3 sets the Cache-Control header to cache session cookies when a user is autocreated, which allows remote attackers to authenticate as the created user.
References
▼ | URL | Tags |
---|---|---|
https://bugzilla.wikimedia.org/show_bug.cgi?id=53032 | x_refsource_MISC | |
http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123011.html | x_refsource_MISC | |
http://lists.fedoraproject.org/pipermail/package-announce/2013-December/122998.html | x_refsource_MISC | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-November/000135.html | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Wikimedia Foundation | MediaWiki |
Version: before 1.19.9 Version: 1.20.x before 1.20.8 Version: 1.21.x before 1.21.3 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:45:15.240Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=53032" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123011.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/122998.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-November/000135.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "MediaWiki", "vendor": "Wikimedia Foundation", "versions": [ { "status": "affected", "version": "before 1.19.9" }, { "status": "affected", "version": "1.20.x before 1.20.8" }, { "status": "affected", "version": "1.21.x before 1.21.3" } ] } ], "datePublic": "2013-08-19T00:00:00", "descriptions": [ { "lang": "en", "value": "The CentralNotice extension for MediaWiki before 1.19.9, 1.20.x before 1.20.8, and 1.21.x before 1.21.3 sets the Cache-Control header to cache session cookies when a user is autocreated, which allows remote attackers to authenticate as the created user." } ], "problemTypes": [ { "descriptions": [ { "description": "Other", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-06T14:40:13", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=53032" }, { "tags": [ "x_refsource_MISC" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123011.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/122998.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-November/000135.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4572", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "MediaWiki", "version": { "version_data": [ { "version_value": "before 1.19.9" }, { "version_value": "1.20.x before 1.20.8" }, { "version_value": "1.21.x before 1.21.3" } ] } } ] }, "vendor_name": "Wikimedia Foundation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The CentralNotice extension for MediaWiki before 1.19.9, 1.20.x before 1.20.8, and 1.21.x before 1.21.3 sets the Cache-Control header to cache session cookies when a user is autocreated, which allows remote attackers to authenticate as the created user." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Other" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.wikimedia.org/show_bug.cgi?id=53032", "refsource": "MISC", "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=53032" }, { "name": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123011.html", "refsource": "MISC", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123011.html" }, { "name": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/122998.html", "refsource": "MISC", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-December/122998.html" }, { "name": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-November/000135.html", "refsource": "CONFIRM", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-November/000135.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-4572", "datePublished": "2020-02-06T14:40:13", "dateReserved": "2013-06-12T00:00:00", "dateUpdated": "2024-08-06T16:45:15.240Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-12469
Vulnerability from cvelistv5
Published
2019-07-10 16:01
Modified
2024-08-04 23:24
Severity ?
EPSS score ?
Summary
MediaWiki through 1.32.1 has Incorrect Access Control. Suppressed username or log in Special:EditTags are exposed. Fixed in 1.32.2, 1.31.2, 1.30.2 and 1.27.6.
References
▼ | URL | Tags |
---|---|---|
https://www.debian.org/security/2019/dsa-4460 | vendor-advisory, x_refsource_DEBIAN | |
https://seclists.org/bugtraq/2019/Jun/12 | mailing-list, x_refsource_BUGTRAQ | |
https://phabricator.wikimedia.org/T222036 | x_refsource_MISC | |
https://lists.wikimedia.org/pipermail/wikitech-l/2019-June/092152.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:24:37.084Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "DSA-4460", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2019/dsa-4460" }, { "name": "20190612 [SECURITY] [DSA 4460-1] mediawiki security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Jun/12" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T222036" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2019-June/092152.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "MediaWiki through 1.32.1 has Incorrect Access Control. Suppressed username or log in Special:EditTags are exposed. Fixed in 1.32.2, 1.31.2, 1.30.2 and 1.27.6." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-07-10T16:02:25", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "DSA-4460", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2019/dsa-4460" }, { "name": "20190612 [SECURITY] [DSA 4460-1] mediawiki security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Jun/12" }, { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T222036" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2019-June/092152.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-12469", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MediaWiki through 1.32.1 has Incorrect Access Control. Suppressed username or log in Special:EditTags are exposed. Fixed in 1.32.2, 1.31.2, 1.30.2 and 1.27.6." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "DSA-4460", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2019/dsa-4460" }, { "name": "20190612 [SECURITY] [DSA 4460-1] mediawiki security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Jun/12" }, { "name": "https://phabricator.wikimedia.org/T222036", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T222036" }, { "name": "https://lists.wikimedia.org/pipermail/wikitech-l/2019-June/092152.html", "refsource": "CONFIRM", "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2019-June/092152.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-12469", "datePublished": "2019-07-10T16:01:53", "dateReserved": "2019-05-30T00:00:00", "dateUpdated": "2024-08-04T23:24:37.084Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39193
Vulnerability from cvelistv5
Published
2023-01-20 00:00
Modified
2024-08-03 12:00
Severity ?
EPSS score ?
Summary
An issue was discovered in the CheckUser extension for MediaWiki through 1.39.x. Various components of this extension can expose information on the performer of edits and logged actions. This information should not allow public viewing: it is supposed to be viewable only by users with suppression rights.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:00:42.357Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T311337" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the CheckUser extension for MediaWiki through 1.39.x. Various components of this extension can expose information on the performer of edits and logged actions. This information should not allow public viewing: it is supposed to be viewable only by users with suppression rights." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-29T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T311337" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-39193", "datePublished": "2023-01-20T00:00:00", "dateReserved": "2022-09-02T00:00:00", "dateUpdated": "2024-08-03T12:00:42.357Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28209
Vulnerability from cvelistv5
Published
2022-03-30 00:00
Modified
2024-08-03 05:48
Severity ?
EPSS score ?
Summary
An issue was discovered in Mediawiki through 1.37.1. The check for the override-antispoof permission in the AntiSpoof extension is incorrect.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:48:37.364Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T304126" }, { "tags": [ "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/Id8c4e2e336695ce70ccdf8a51ad729bf4a99f8f7" }, { "name": "GLSA-202305-24", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202305-24" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Mediawiki through 1.37.1. The check for the override-antispoof permission in the AntiSpoof extension is incorrect." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-21T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T304126" }, { "url": "https://gerrit.wikimedia.org/r/q/Id8c4e2e336695ce70ccdf8a51ad729bf4a99f8f7" }, { "name": "GLSA-202305-24", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202305-24" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-28209", "datePublished": "2022-03-30T00:00:00", "dateReserved": "2022-03-30T00:00:00", "dateUpdated": "2024-08-03T05:48:37.364Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-12470
Vulnerability from cvelistv5
Published
2019-07-10 16:04
Modified
2024-08-04 23:24
Severity ?
EPSS score ?
Summary
Wikimedia MediaWiki through 1.32.1 has Incorrect Access Control. Suppressed log in RevisionDelete page is exposed. Fixed in 1.32.2, 1.31.2, 1.30.2 and 1.27.6.
References
▼ | URL | Tags |
---|---|---|
https://www.debian.org/security/2019/dsa-4460 | vendor-advisory, x_refsource_DEBIAN | |
https://seclists.org/bugtraq/2019/Jun/12 | mailing-list, x_refsource_BUGTRAQ | |
https://phabricator.wikimedia.org/T222038 | x_refsource_MISC | |
https://lists.wikimedia.org/pipermail/wikitech-l/2019-June/092152.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:24:37.084Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "DSA-4460", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2019/dsa-4460" }, { "name": "20190612 [SECURITY] [DSA 4460-1] mediawiki security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Jun/12" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T222038" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2019-June/092152.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Wikimedia MediaWiki through 1.32.1 has Incorrect Access Control. Suppressed log in RevisionDelete page is exposed. Fixed in 1.32.2, 1.31.2, 1.30.2 and 1.27.6." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-07-10T16:05:22", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "DSA-4460", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2019/dsa-4460" }, { "name": "20190612 [SECURITY] [DSA 4460-1] mediawiki security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Jun/12" }, { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T222038" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2019-June/092152.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-12470", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Wikimedia MediaWiki through 1.32.1 has Incorrect Access Control. Suppressed log in RevisionDelete page is exposed. Fixed in 1.32.2, 1.31.2, 1.30.2 and 1.27.6." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "DSA-4460", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2019/dsa-4460" }, { "name": "20190612 [SECURITY] [DSA 4460-1] mediawiki security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Jun/12" }, { "name": "https://phabricator.wikimedia.org/T222038", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T222038" }, { "name": "https://lists.wikimedia.org/pipermail/wikitech-l/2019-June/092152.html", "refsource": "CONFIRM", "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2019-June/092152.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-12470", "datePublished": "2019-07-10T16:04:55", "dateReserved": "2019-05-30T00:00:00", "dateUpdated": "2024-08-04T23:24:37.084Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-29905
Vulnerability from cvelistv5
Published
2022-04-29 03:43
Modified
2024-08-03 06:33
Severity ?
EPSS score ?
Summary
The FanBoxes extension for MediaWiki through 1.37.2 (before 027ffb0b9d6fe0d823810cf03f5b562a212162d4) allows Special:UserBoxes CSRF.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T306741 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/c/mediawiki/extensions/FanBoxes/+/786327 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:33:42.956Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T306741" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/FanBoxes/+/786327" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The FanBoxes extension for MediaWiki through 1.37.2 (before 027ffb0b9d6fe0d823810cf03f5b562a212162d4) allows Special:UserBoxes CSRF." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-29T03:43:22", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T306741" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/FanBoxes/+/786327" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-29905", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The FanBoxes extension for MediaWiki through 1.37.2 (before 027ffb0b9d6fe0d823810cf03f5b562a212162d4) allows Special:UserBoxes CSRF." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T306741", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T306741" }, { "name": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/FanBoxes/+/786327", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/FanBoxes/+/786327" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-29905", "datePublished": "2022-04-29T03:43:22", "dateReserved": "2022-04-29T00:00:00", "dateUpdated": "2024-08-03T06:33:42.956Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-2787
Vulnerability from cvelistv5
Published
2011-04-27 00:00
Modified
2024-08-07 02:46
Severity ?
EPSS score ?
Summary
api.php in MediaWiki before 1.15.5 does not prevent use of public caching headers for private data, which allows remote attackers to bypass intended access restrictions and obtain sensitive information by retrieving documents from an HTTP proxy cache that has been used by a victim.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:46:48.599Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "FEDORA-2011-5495", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058588.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=620226" }, { "name": "FEDORA-2011-5807", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059235.html" }, { "name": "[oss-security] 20100729 Re: CVE request: mediawiki", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2010/07/29/4" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.wikimedia.org/viewvc/mediawiki?view=revision\u0026revision=69776" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=24565" }, { "name": "FEDORA-2011-5848", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058910.html" }, { "name": "[mediawiki-announce] 20100728 MediaWiki security release: 1.16.0 and 1.15.5", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2010-July/000092.html" }, { "name": "42019", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/42019" }, { "name": "FEDORA-2011-5812", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059232.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=620224" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-07-28T00:00:00", "descriptions": [ { "lang": "en", "value": "api.php in MediaWiki before 1.15.5 does not prevent use of public caching headers for private data, which allows remote attackers to bypass intended access restrictions and obtain sensitive information by retrieving documents from an HTTP proxy cache that has been used by a victim." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-09-07T09:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "FEDORA-2011-5495", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058588.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=620226" }, { "name": "FEDORA-2011-5807", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059235.html" }, { "name": "[oss-security] 20100729 Re: CVE request: mediawiki", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2010/07/29/4" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.wikimedia.org/viewvc/mediawiki?view=revision\u0026revision=69776" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=24565" }, { "name": "FEDORA-2011-5848", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058910.html" }, { "name": "[mediawiki-announce] 20100728 MediaWiki security release: 1.16.0 and 1.15.5", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2010-July/000092.html" }, { "name": "42019", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/42019" }, { "name": "FEDORA-2011-5812", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059232.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=620224" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2010-2787", "datePublished": "2011-04-27T00:00:00", "dateReserved": "2010-07-22T00:00:00", "dateUpdated": "2024-08-07T02:46:48.599Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-19910
Vulnerability from cvelistv5
Published
2019-12-19 18:41
Modified
2024-08-05 02:32
Severity ?
EPSS score ?
Summary
The MinervaNeue Skin in MediaWiki from 2019-11-05 to 2019-12-13 (1.35 and/or 1.34) mishandles certain HTML attributes, as demonstrated by IMG onmouseover= (impact is XSS) and IMG src=http (impact is disclosing the client's IP address). This can occur within a talk page topical header that is viewed within a mobile (MobileFrontend) context.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T240487 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/Ida471291f1698387a26736931ab17e6899e05b51 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T02:32:09.467Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T240487" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/Ida471291f1698387a26736931ab17e6899e05b51" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The MinervaNeue Skin in MediaWiki from 2019-11-05 to 2019-12-13 (1.35 and/or 1.34) mishandles certain HTML attributes, as demonstrated by IMG onmouseover= (impact is XSS) and IMG src=http (impact is disclosing the client\u0027s IP address). This can occur within a talk page topical header that is viewed within a mobile (MobileFrontend) context." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-12-19T18:41:25", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T240487" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/Ida471291f1698387a26736931ab17e6899e05b51" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-19910", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The MinervaNeue Skin in MediaWiki from 2019-11-05 to 2019-12-13 (1.35 and/or 1.34) mishandles certain HTML attributes, as demonstrated by IMG onmouseover= (impact is XSS) and IMG src=http (impact is disclosing the client\u0027s IP address). This can occur within a talk page topical header that is viewed within a mobile (MobileFrontend) context." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T240487", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T240487" }, { "name": "https://gerrit.wikimedia.org/r/q/Ida471291f1698387a26736931ab17e6899e05b51", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/Ida471291f1698387a26736931ab17e6899e05b51" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-19910", "datePublished": "2019-12-19T18:41:25", "dateReserved": "2019-12-19T00:00:00", "dateUpdated": "2024-08-05T02:32:09.467Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-4308
Vulnerability from cvelistv5
Published
2013-09-11 14:00
Modified
2024-08-06 16:38
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in pages/TalkpageHistoryView.php in the LiquidThreads (LQT) extension 2.x and possibly 3.x for MediaWiki 1.19.x before 1.19.8, 1.20.x before 1.20.7, and 1.21.x before 1.21.2 allows remote attackers to inject arbitrary web script or HTML via a thread subject.
References
▼ | URL | Tags |
---|---|---|
http://seclists.org/oss-sec/2013/q3/553 | mailing-list, x_refsource_MLIST | |
http://osvdb.org/96906 | vdb-entry, x_refsource_OSVDB | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-September/000133.html | mailing-list, x_refsource_MLIST | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/86891 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/62218 | vdb-entry, x_refsource_BID | |
https://bugzilla.wikimedia.org/show_bug.cgi?id=53320 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:38:01.857Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20130904 Re: CVE request: MediaWiki Security Release: 1.21.2, 1.20.7 and 1.19.8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2013/q3/553" }, { "name": "96906", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/96906" }, { "name": "[MediaWiki-announce] 20130903 MediaWiki Security Release: 1.21.2, 1.20.7 and 1.19.8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-September/000133.html" }, { "name": "mediawiki-cve20134308-xss(86891)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86891" }, { "name": "62218", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/62218" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=53320" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-09-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in pages/TalkpageHistoryView.php in the LiquidThreads (LQT) extension 2.x and possibly 3.x for MediaWiki 1.19.x before 1.19.8, 1.20.x before 1.20.7, and 1.21.x before 1.21.2 allows remote attackers to inject arbitrary web script or HTML via a thread subject." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[oss-security] 20130904 Re: CVE request: MediaWiki Security Release: 1.21.2, 1.20.7 and 1.19.8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2013/q3/553" }, { "name": "96906", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/96906" }, { "name": "[MediaWiki-announce] 20130903 MediaWiki Security Release: 1.21.2, 1.20.7 and 1.19.8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-September/000133.html" }, { "name": "mediawiki-cve20134308-xss(86891)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86891" }, { "name": "62218", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/62218" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=53320" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4308", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in pages/TalkpageHistoryView.php in the LiquidThreads (LQT) extension 2.x and possibly 3.x for MediaWiki 1.19.x before 1.19.8, 1.20.x before 1.20.7, and 1.21.x before 1.21.2 allows remote attackers to inject arbitrary web script or HTML via a thread subject." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20130904 Re: CVE request: MediaWiki Security Release: 1.21.2, 1.20.7 and 1.19.8", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2013/q3/553" }, { "name": "96906", "refsource": "OSVDB", "url": "http://osvdb.org/96906" }, { "name": "[MediaWiki-announce] 20130903 MediaWiki Security Release: 1.21.2, 1.20.7 and 1.19.8", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-September/000133.html" }, { "name": "mediawiki-cve20134308-xss(86891)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86891" }, { "name": "62218", "refsource": "BID", "url": "http://www.securityfocus.com/bid/62218" }, { "name": "https://bugzilla.wikimedia.org/show_bug.cgi?id=53320", "refsource": "CONFIRM", "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=53320" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-4308", "datePublished": "2013-09-11T14:00:00", "dateReserved": "2013-06-12T00:00:00", "dateUpdated": "2024-08-06T16:38:01.857Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2005-1888
Vulnerability from cvelistv5
Published
2005-06-08 04:00
Modified
2024-08-07 22:06
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in MediaWiki before 1.4.5 allows remote attackers to inject arbitrary web script via HTML attributes in page templates.
References
▼ | URL | Tags |
---|---|---|
http://www.novell.com/linux/security/advisories/2005_19_sr.html | vendor-advisory, x_refsource_SUSE | |
http://sourceforge.net/project/shownotes.php?release_id=332231 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/13861 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T22:06:57.720Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SUSE-SR:2005:019", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2005_19_sr.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sourceforge.net/project/shownotes.php?release_id=332231" }, { "name": "13861", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/13861" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-06-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in MediaWiki before 1.4.5 allows remote attackers to inject arbitrary web script via HTML attributes in page templates." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2006-06-27T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "SUSE-SR:2005:019", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2005_19_sr.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sourceforge.net/project/shownotes.php?release_id=332231" }, { "name": "13861", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/13861" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-1888", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in MediaWiki before 1.4.5 allows remote attackers to inject arbitrary web script via HTML attributes in page templates." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "SUSE-SR:2005:019", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2005_19_sr.html" }, { "name": "http://sourceforge.net/project/shownotes.php?release_id=332231", "refsource": "CONFIRM", "url": "http://sourceforge.net/project/shownotes.php?release_id=332231" }, { "name": "13861", "refsource": "BID", "url": "http://www.securityfocus.com/bid/13861" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-1888", "datePublished": "2005-06-08T04:00:00", "dateReserved": "2005-06-08T00:00:00", "dateUpdated": "2024-08-07T22:06:57.720Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-2932
Vulnerability from cvelistv5
Published
2015-04-13 14:00
Modified
2024-08-06 05:32
Severity ?
EPSS score ?
Summary
Incomplete blacklist vulnerability in MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2 allows remote attackers to inject arbitrary web script or HTML via an animated href XLink element.
References
▼ | URL | Tags |
---|---|---|
https://security.gentoo.org/glsa/201510-05 | vendor-advisory, x_refsource_GENTOO | |
http://www.mandriva.com/security/advisories?name=MDVSA-2015:200 | vendor-advisory, x_refsource_MANDRIVA | |
http://www.securityfocus.com/bid/73477 | vdb-entry, x_refsource_BID | |
http://www.openwall.com/lists/oss-security/2015/04/07/3 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2015/04/01/1 | mailing-list, x_refsource_MLIST | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html | mailing-list, x_refsource_MLIST | |
https://phabricator.wikimedia.org/T86711 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:32:20.386Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201510-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201510-05" }, { "name": "MDVSA-2015:200", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:200" }, { "name": "73477", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/73477" }, { "name": "[oss-security] 20150407 Re: CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/04/07/3" }, { "name": "[oss-security] 20150331 CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/04/01/1" }, { "name": "[MediaWiki-announce] 20150331 MediaWiki Security and Maintenance Releases: 1.19.24, 1.23.9, and 1.24.2", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T86711" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-03-31T00:00:00", "descriptions": [ { "lang": "en", "value": "Incomplete blacklist vulnerability in MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2 allows remote attackers to inject arbitrary web script or HTML via an animated href XLink element." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-05T21:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "GLSA-201510-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201510-05" }, { "name": "MDVSA-2015:200", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:200" }, { "name": "73477", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/73477" }, { "name": "[oss-security] 20150407 Re: CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/04/07/3" }, { "name": "[oss-security] 20150331 CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/04/01/1" }, { "name": "[MediaWiki-announce] 20150331 MediaWiki Security and Maintenance Releases: 1.19.24, 1.23.9, and 1.24.2", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T86711" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-2932", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Incomplete blacklist vulnerability in MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2 allows remote attackers to inject arbitrary web script or HTML via an animated href XLink element." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201510-05", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201510-05" }, { "name": "MDVSA-2015:200", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:200" }, { "name": "73477", "refsource": "BID", "url": "http://www.securityfocus.com/bid/73477" }, { "name": "[oss-security] 20150407 Re: CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/04/07/3" }, { "name": "[oss-security] 20150331 CVE request: MediaWiki 1.24.2/1.23.9/1.19.24", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/04/01/1" }, { "name": "[MediaWiki-announce] 20150331 MediaWiki Security and Maintenance Releases: 1.19.24, 1.23.9, and 1.24.2", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html" }, { "name": "https://phabricator.wikimedia.org/T86711", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T86711" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-2932", "datePublished": "2015-04-13T14:00:00", "dateReserved": "2015-04-07T00:00:00", "dateUpdated": "2024-08-06T05:32:20.386Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-6455
Vulnerability from cvelistv5
Published
2020-01-28 14:54
Modified
2024-08-06 17:39
Severity ?
EPSS score ?
Summary
The CentralAuth extension for MediaWiki before 1.19.10, 1.2x before 1.21.4, and 1.22.x before 1.22.1 allows remote attackers to obtain usernames via vectors related to writing the names to the DOM of a page.
References
▼ | URL | Tags |
---|---|---|
http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000138.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Wikimedia Foundation | MediaWiki |
Version: before 1.19.10 Version: 1.2x before 1.21.4 Version: 1.22.x before 1.22.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T17:39:01.461Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000138.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "MediaWiki", "vendor": "Wikimedia Foundation", "versions": [ { "status": "affected", "version": "before 1.19.10" }, { "status": "affected", "version": "1.2x before 1.21.4" }, { "status": "affected", "version": "1.22.x before 1.22.1" } ] } ], "datePublic": "2014-01-14T00:00:00", "descriptions": [ { "lang": "en", "value": "The CentralAuth extension for MediaWiki before 1.19.10, 1.2x before 1.21.4, and 1.22.x before 1.22.1 allows remote attackers to obtain usernames via vectors related to writing the names to the DOM of a page." } ], "problemTypes": [ { "descriptions": [ { "description": "Path Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-01-28T14:54:22", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000138.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-6455", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "MediaWiki", "version": { "version_data": [ { "version_value": "before 1.19.10" }, { "version_value": "1.2x before 1.21.4" }, { "version_value": "1.22.x before 1.22.1" } ] } } ] }, "vendor_name": "Wikimedia Foundation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The CentralAuth extension for MediaWiki before 1.19.10, 1.2x before 1.21.4, and 1.22.x before 1.22.1 allows remote attackers to obtain usernames via vectors related to writing the names to the DOM of a page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Path Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000138.html", "refsource": "MISC", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000138.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-6455", "datePublished": "2020-01-28T14:54:22", "dateReserved": "2013-11-04T00:00:00", "dateUpdated": "2024-08-06T17:39:01.461Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-2186
Vulnerability from cvelistv5
Published
2005-07-10 04:00
Modified
2024-09-17 02:01
Severity ?
EPSS score ?
Summary
SQL injection vulnerability in MediaWiki 1.3.5 allows remote attackers to execute arbitrary SQL commands via SpecialMaintenance.
References
▼ | URL | Tags |
---|---|---|
http://sourceforge.net/project/shownotes.php?release_id=275099 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/11416 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T01:15:01.659Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sourceforge.net/project/shownotes.php?release_id=275099" }, { "name": "11416", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/11416" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in MediaWiki 1.3.5 allows remote attackers to execute arbitrary SQL commands via SpecialMaintenance." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-07-10T04:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sourceforge.net/project/shownotes.php?release_id=275099" }, { "name": "11416", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/11416" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-2186", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SQL injection vulnerability in MediaWiki 1.3.5 allows remote attackers to execute arbitrary SQL commands via SpecialMaintenance." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://sourceforge.net/project/shownotes.php?release_id=275099", "refsource": "CONFIRM", "url": "http://sourceforge.net/project/shownotes.php?release_id=275099" }, { "name": "11416", "refsource": "BID", "url": "http://www.securityfocus.com/bid/11416" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-2186", "datePublished": "2005-07-10T04:00:00Z", "dateReserved": "2005-07-10T04:00:00Z", "dateUpdated": "2024-09-17T02:01:46.906Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-40603
Vulnerability from cvelistv5
Published
2024-07-06 00:00
Modified
2024-08-02 04:33
Severity ?
EPSS score ?
Summary
An issue was discovered in the ArticleRatings extension for MediaWiki through 1.42.1. Special:ChangeRating allows CSRF to alter data via a GET request.
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-40603", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-08T13:44:44.832247Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-08T13:45:03.104Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T04:33:11.671Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T363884" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the ArticleRatings extension for MediaWiki through 1.42.1. Special:ChangeRating allows CSRF to alter data via a GET request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-06T23:27:04.293176", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T363884" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-40603", "datePublished": "2024-07-06T00:00:00", "dateReserved": "2024-07-06T00:00:00", "dateUpdated": "2024-08-02T04:33:11.671Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36130
Vulnerability from cvelistv5
Published
2021-07-02 13:00
Modified
2024-08-04 00:47
Severity ?
EPSS score ?
Summary
An XSS issue was discovered in the SocialProfile extension in MediaWiki through 1.36. Within several gift-related special pages, a privileged user with the awardmanage right could inject arbitrary HTML and JavaScript within various gift-related data fields. The attack could easily propagate across many pages for many users.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T281043 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/Id915eba45497a1a0dc1c4e00818a2fd4c0ce55d3 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:47:43.819Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T281043" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/Id915eba45497a1a0dc1c4e00818a2fd4c0ce55d3" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An XSS issue was discovered in the SocialProfile extension in MediaWiki through 1.36. Within several gift-related special pages, a privileged user with the awardmanage right could inject arbitrary HTML and JavaScript within various gift-related data fields. The attack could easily propagate across many pages for many users." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-02T13:00:25", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T281043" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/Id915eba45497a1a0dc1c4e00818a2fd4c0ce55d3" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-36130", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An XSS issue was discovered in the SocialProfile extension in MediaWiki through 1.36. Within several gift-related special pages, a privileged user with the awardmanage right could inject arbitrary HTML and JavaScript within various gift-related data fields. The attack could easily propagate across many pages for many users." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T281043", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T281043" }, { "name": "https://gerrit.wikimedia.org/r/q/Id915eba45497a1a0dc1c4e00818a2fd4c0ce55d3", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/Id915eba45497a1a0dc1c4e00818a2fd4c0ce55d3" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-36130", "datePublished": "2021-07-02T13:00:25", "dateReserved": "2021-07-02T00:00:00", "dateUpdated": "2024-08-04T00:47:43.819Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46147
Vulnerability from cvelistv5
Published
2022-01-07 05:54
Modified
2024-08-04 05:02
Severity ?
EPSS score ?
Summary
An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. MassEditRegex allows CSRF.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T293341 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/I5980de35b0a01b5242b68b7b0bdc08adf5d968d8 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:02:10.274Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T293341" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/I5980de35b0a01b5242b68b7b0bdc08adf5d968d8" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. MassEditRegex allows CSRF." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T05:54:25", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T293341" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/I5980de35b0a01b5242b68b7b0bdc08adf5d968d8" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-46147", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. MassEditRegex allows CSRF." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T293341", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T293341" }, { "name": "https://gerrit.wikimedia.org/r/q/I5980de35b0a01b5242b68b7b0bdc08adf5d968d8", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/I5980de35b0a01b5242b68b7b0bdc08adf5d968d8" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-46147", "datePublished": "2022-01-07T05:54:25", "dateReserved": "2022-01-07T00:00:00", "dateUpdated": "2024-08-04T05:02:10.274Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-42048
Vulnerability from cvelistv5
Published
2021-10-06 20:47
Modified
2024-08-04 03:22
Severity ?
EPSS score ?
Summary
An issue was discovered in the Growth extension in MediaWiki through 1.36.2. Any admin can add arbitrary JavaScript code to the Newcomer home page footer, which can be executed by viewers with zero edits.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T289064 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/Iaa90a8976834d70caad592e9d1b18510318db537 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:22:25.972Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T289064" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/Iaa90a8976834d70caad592e9d1b18510318db537" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the Growth extension in MediaWiki through 1.36.2. Any admin can add arbitrary JavaScript code to the Newcomer home page footer, which can be executed by viewers with zero edits." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-29T16:39:15", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T289064" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/Iaa90a8976834d70caad592e9d1b18510318db537" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-42048", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in the Growth extension in MediaWiki through 1.36.2. Any admin can add arbitrary JavaScript code to the Newcomer home page footer, which can be executed by viewers with zero edits." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T289064", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T289064" }, { "name": "https://gerrit.wikimedia.org/r/q/Iaa90a8976834d70caad592e9d1b18510318db537", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/Iaa90a8976834d70caad592e9d1b18510318db537" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-42048", "datePublished": "2021-10-06T20:47:15", "dateReserved": "2021-10-06T00:00:00", "dateUpdated": "2024-08-04T03:22:25.972Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-1581
Vulnerability from cvelistv5
Published
2012-09-09 21:00
Modified
2024-08-06 19:01
Severity ?
EPSS score ?
Summary
MediaWiki 1.17.x before 1.17.3 and 1.18.x before 1.18.2 uses weak random numbers for password reset tokens, which makes it easier for remote attackers to change the passwords of arbitrary users.
References
▼ | URL | Tags |
---|---|---|
https://bugzilla.wikimedia.org/show_bug.cgi?id=35078 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2012/03/24/1 | mailing-list, x_refsource_MLIST | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000110.html | mailing-list, x_refsource_MLIST | |
http://secunia.com/advisories/48504 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/78910 | vdb-entry, x_refsource_XF | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000109.html | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2012/03/22/9 | mailing-list, x_refsource_MLIST | |
http://www.securityfocus.com/bid/52689 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:01:02.685Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=35078" }, { "name": "[oss-security] 20120323 CVEs for MediaWiki security and maintenance release 1.18.2", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/03/24/1" }, { "name": "[MediaWiki-announce] 20120322 MediaWiki security and maintenance release 1.18.2", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000110.html" }, { "name": "48504", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48504" }, { "name": "mediawiki-random-numbers-sec-bypass(78910)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78910" }, { "name": "[MediaWiki-announce] 20120322 MediaWiki security and maintenance release 1.17.3", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000109.html" }, { "name": "[oss-security] 20120322 MediaWiki security and maintenance release 1.18.2", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/03/22/9" }, { "name": "52689", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/52689" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-03-22T00:00:00", "descriptions": [ { "lang": "en", "value": "MediaWiki 1.17.x before 1.17.3 and 1.18.x before 1.18.2 uses weak random numbers for password reset tokens, which makes it easier for remote attackers to change the passwords of arbitrary users." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=35078" }, { "name": "[oss-security] 20120323 CVEs for MediaWiki security and maintenance release 1.18.2", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/03/24/1" }, { "name": "[MediaWiki-announce] 20120322 MediaWiki security and maintenance release 1.18.2", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000110.html" }, { "name": "48504", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48504" }, { "name": "mediawiki-random-numbers-sec-bypass(78910)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78910" }, { "name": "[MediaWiki-announce] 20120322 MediaWiki security and maintenance release 1.17.3", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000109.html" }, { "name": "[oss-security] 20120322 MediaWiki security and maintenance release 1.18.2", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/03/22/9" }, { "name": "52689", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/52689" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-1581", "datePublished": "2012-09-09T21:00:00", "dateReserved": "2012-03-12T00:00:00", "dateUpdated": "2024-08-06T19:01:02.685Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-12467
Vulnerability from cvelistv5
Published
2019-07-10 14:45
Modified
2024-08-04 23:24
Severity ?
EPSS score ?
Summary
MediaWiki through 1.32.1 has Incorrect Access Control (issue 1 of 3). A spammer can use Special:ChangeEmail to send out spam with no rate limiting or ability to block them. Fixed in 1.32.2, 1.31.2, 1.30.2 and 1.27.6.
References
▼ | URL | Tags |
---|---|---|
https://www.debian.org/security/2019/dsa-4460 | vendor-advisory, x_refsource_DEBIAN | |
https://seclists.org/bugtraq/2019/Jun/12 | mailing-list, x_refsource_BUGTRAQ | |
https://lists.wikimedia.org/pipermail/wikitech-l/2019-June/092152.html | x_refsource_CONFIRM | |
https://phabricator.wikimedia.org/T209794 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:24:37.085Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "DSA-4460", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2019/dsa-4460" }, { "name": "20190612 [SECURITY] [DSA 4460-1] mediawiki security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Jun/12" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2019-June/092152.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T209794" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "MediaWiki through 1.32.1 has Incorrect Access Control (issue 1 of 3). A spammer can use Special:ChangeEmail to send out spam with no rate limiting or ability to block them. Fixed in 1.32.2, 1.31.2, 1.30.2 and 1.27.6." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-07-10T14:45:43", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "DSA-4460", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2019/dsa-4460" }, { "name": "20190612 [SECURITY] [DSA 4460-1] mediawiki security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Jun/12" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2019-June/092152.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T209794" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-12467", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MediaWiki through 1.32.1 has Incorrect Access Control (issue 1 of 3). A spammer can use Special:ChangeEmail to send out spam with no rate limiting or ability to block them. Fixed in 1.32.2, 1.31.2, 1.30.2 and 1.27.6." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "DSA-4460", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2019/dsa-4460" }, { "name": "20190612 [SECURITY] [DSA 4460-1] mediawiki security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Jun/12" }, { "name": "https://lists.wikimedia.org/pipermail/wikitech-l/2019-June/092152.html", "refsource": "CONFIRM", "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2019-June/092152.html" }, { "name": "https://phabricator.wikimedia.org/T209794", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T209794" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-12467", "datePublished": "2019-07-10T14:45:01", "dateReserved": "2019-05-30T00:00:00", "dateUpdated": "2024-08-04T23:24:37.085Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-1579
Vulnerability from cvelistv5
Published
2012-09-09 21:00
Modified
2024-08-06 19:01
Severity ?
EPSS score ?
Summary
The resource loader in MediaWiki 1.17.x before 1.17.3 and 1.18.x before 1.18.2 includes private data such as CSRF tokens in a JavaScript file, which allows remote attackers to obtain sensitive information.
References
▼ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2012/03/24/1 | mailing-list, x_refsource_MLIST | |
https://bugzilla.wikimedia.org/show_bug.cgi?id=34907 | x_refsource_CONFIRM | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000110.html | mailing-list, x_refsource_MLIST | |
http://secunia.com/advisories/48504 | third-party-advisory, x_refsource_SECUNIA | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000109.html | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2012/03/22/9 | mailing-list, x_refsource_MLIST | |
http://www.securityfocus.com/bid/52689 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:01:02.555Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20120323 CVEs for MediaWiki security and maintenance release 1.18.2", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/03/24/1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=34907" }, { "name": "[MediaWiki-announce] 20120322 MediaWiki security and maintenance release 1.18.2", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000110.html" }, { "name": "48504", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48504" }, { "name": "[MediaWiki-announce] 20120322 MediaWiki security and maintenance release 1.17.3", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000109.html" }, { "name": "[oss-security] 20120322 MediaWiki security and maintenance release 1.18.2", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/03/22/9" }, { "name": "52689", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/52689" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The resource loader in MediaWiki 1.17.x before 1.17.3 and 1.18.x before 1.18.2 includes private data such as CSRF tokens in a JavaScript file, which allows remote attackers to obtain sensitive information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-09-09T21:00:00Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[oss-security] 20120323 CVEs for MediaWiki security and maintenance release 1.18.2", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/03/24/1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=34907" }, { "name": "[MediaWiki-announce] 20120322 MediaWiki security and maintenance release 1.18.2", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000110.html" }, { "name": "48504", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48504" }, { "name": "[MediaWiki-announce] 20120322 MediaWiki security and maintenance release 1.17.3", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000109.html" }, { "name": "[oss-security] 20120322 MediaWiki security and maintenance release 1.18.2", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/03/22/9" }, { "name": "52689", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/52689" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-1579", "datePublished": "2012-09-09T21:00:00Z", "dateReserved": "2012-03-12T00:00:00Z", "dateUpdated": "2024-08-06T19:01:02.555Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-9487
Vulnerability from cvelistv5
Published
2017-10-17 14:00
Modified
2024-08-06 13:47
Severity ?
EPSS score ?
Summary
The getid3 library in MediaWiki before 1.24.1, 1.23.8, 1.22.15 and 1.19.23 allows remote attackers to read arbitrary files, cause a denial of service, or possibly have other impact via an XML External Entity (XXE) attack. NOTE: Related to CVE-2014-2053.
References
▼ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2015/01/03/13 | mailing-list, x_refsource_MLIST | |
https://security.gentoo.org/glsa/201502-04 | vendor-advisory, x_refsource_GENTOO | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-December/000173.html | mailing-list, x_refsource_MLIST | |
https://bugzilla.redhat.com/show_bug.cgi?id=1175828 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:47:41.107Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20150103 Re: CVE Request: Mediawiki security releases 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/01/03/13" }, { "name": "GLSA-201502-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201502-04" }, { "name": "[MediaWiki-announce] 20141217 MediaWiki Security and Maintenance Releases: 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-December/000173.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1175828" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-12-17T00:00:00", "descriptions": [ { "lang": "en", "value": "The getid3 library in MediaWiki before 1.24.1, 1.23.8, 1.22.15 and 1.19.23 allows remote attackers to read arbitrary files, cause a denial of service, or possibly have other impact via an XML External Entity (XXE) attack. NOTE: Related to CVE-2014-2053." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-17T13:57:01", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "name": "[oss-security] 20150103 Re: CVE Request: Mediawiki security releases 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/01/03/13" }, { "name": "GLSA-201502-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201502-04" }, { "name": "[MediaWiki-announce] 20141217 MediaWiki Security and Maintenance Releases: 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-December/000173.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1175828" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "ID": "CVE-2014-9487", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The getid3 library in MediaWiki before 1.24.1, 1.23.8, 1.22.15 and 1.19.23 allows remote attackers to read arbitrary files, cause a denial of service, or possibly have other impact via an XML External Entity (XXE) attack. NOTE: Related to CVE-2014-2053." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20150103 Re: CVE Request: Mediawiki security releases 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/01/03/13" }, { "name": "GLSA-201502-04", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201502-04" }, { "name": "[MediaWiki-announce] 20141217 MediaWiki Security and Maintenance Releases: 1.24.1, 1.23.8, 1.22.15 and 1.19.23", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-December/000173.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1175828", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1175828" } ] } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2014-9487", "datePublished": "2017-10-17T14:00:00", "dateReserved": "2015-01-03T00:00:00", "dateUpdated": "2024-08-06T13:47:41.107Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2005-4031
Vulnerability from cvelistv5
Published
2005-12-06 11:00
Modified
2024-08-07 23:31
Severity ?
EPSS score ?
Summary
Eval injection vulnerability in MediaWiki 1.5.x before 1.5.3 allows remote attackers to execute arbitrary PHP code via the "user language option," which is used as part of a dynamic class name that is processed using the eval function.
References
▼ | URL | Tags |
---|---|---|
http://sourceforge.net/project/shownotes.php?group_id=34373&release_id=375755 | x_refsource_CONFIRM | |
http://secunia.com/advisories/17866 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/15703 | vdb-entry, x_refsource_BID | |
http://www.vupen.com/english/advisories/2005/2726 | vdb-entry, x_refsource_VUPEN | |
http://www.kb.cert.org/vuls/id/392156 | third-party-advisory, x_refsource_CERT-VN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T23:31:48.718Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sourceforge.net/project/shownotes.php?group_id=34373\u0026release_id=375755" }, { "name": "17866", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17866" }, { "name": "15703", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/15703" }, { "name": "ADV-2005-2726", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2005/2726" }, { "name": "VU#392156", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/392156" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-12-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Eval injection vulnerability in MediaWiki 1.5.x before 1.5.3 allows remote attackers to execute arbitrary PHP code via the \"user language option,\" which is used as part of a dynamic class name that is processed using the eval function." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-12-12T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sourceforge.net/project/shownotes.php?group_id=34373\u0026release_id=375755" }, { "name": "17866", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17866" }, { "name": "15703", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/15703" }, { "name": "ADV-2005-2726", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2005/2726" }, { "name": "VU#392156", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/392156" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-4031", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Eval injection vulnerability in MediaWiki 1.5.x before 1.5.3 allows remote attackers to execute arbitrary PHP code via the \"user language option,\" which is used as part of a dynamic class name that is processed using the eval function." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://sourceforge.net/project/shownotes.php?group_id=34373\u0026release_id=375755", "refsource": "CONFIRM", "url": "http://sourceforge.net/project/shownotes.php?group_id=34373\u0026release_id=375755" }, { "name": "17866", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17866" }, { "name": "15703", "refsource": "BID", "url": "http://www.securityfocus.com/bid/15703" }, { "name": "ADV-2005-2726", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2005/2726" }, { "name": "VU#392156", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/392156" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-4031", "datePublished": "2005-12-06T11:00:00", "dateReserved": "2005-12-06T00:00:00", "dateUpdated": "2024-08-07T23:31:48.718Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-1587
Vulnerability from cvelistv5
Published
2011-04-27 00:00
Modified
2024-08-06 22:28
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in MediaWiki before 1.16.4, when Internet Explorer 6 or earlier is used, allows remote attackers to inject arbitrary web script or HTML via an uploaded file accessed with a dangerous extension such as .html located before a ? (question mark) in a query string, in conjunction with a modified URI path that has a %2E sequence in place of the . (dot) character. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-1578.
References
▼ | URL | Tags |
---|---|---|
http://openwall.com/lists/oss-security/2011/04/18/5 | mailing-list, x_refsource_MLIST | |
http://www.debian.org/security/2011/dsa-2366 | vendor-advisory, x_refsource_DEBIAN | |
https://bugzilla.redhat.com/show_bug.cgi?id=696360 | x_refsource_CONFIRM | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-April/000097.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:28:41.933Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20110418 Re: CVE request: mediawiki 1.16.4, incomplete fix of CVE-2011-1578", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/04/18/5" }, { "name": "DSA-2366", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2366" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=696360" }, { "name": "[mediawiki-announce] 20110414 MediaWiki security release 1.16.4", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-April/000097.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-04-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in MediaWiki before 1.16.4, when Internet Explorer 6 or earlier is used, allows remote attackers to inject arbitrary web script or HTML via an uploaded file accessed with a dangerous extension such as .html located before a ? (question mark) in a query string, in conjunction with a modified URI path that has a %2E sequence in place of the . (dot) character. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-1578." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-01-19T10:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[oss-security] 20110418 Re: CVE request: mediawiki 1.16.4, incomplete fix of CVE-2011-1578", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/04/18/5" }, { "name": "DSA-2366", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2366" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=696360" }, { "name": "[mediawiki-announce] 20110414 MediaWiki security release 1.16.4", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-April/000097.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-1587", "datePublished": "2011-04-27T00:00:00", "dateReserved": "2011-04-05T00:00:00", "dateUpdated": "2024-08-06T22:28:41.933Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-6333
Vulnerability from cvelistv5
Published
2017-04-20 17:00
Modified
2024-08-06 01:29
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in the CSS user subpage preview feature in MediaWiki before 1.23.15, 1.26.x before 1.26.4, and 1.27.x before 1.27.1 allows remote attackers to inject arbitrary web script or HTML via the edit box in Special:MyPage/common.css.
References
▼ | URL | Tags |
---|---|---|
https://lists.wikimedia.org/pipermail/mediawiki-announce/2016-August/000195.html | mailing-list, x_refsource_MLIST | |
https://bugzilla.redhat.com/show_bug.cgi?id=1369613 | x_refsource_CONFIRM | |
https://phabricator.wikimedia.org/T133147 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/98053 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:29:19.303Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[MediaWiki-announce] 20160823 Security Release - 1.27.1, 1.26.4, 1.23.15", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2016-August/000195.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369613" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T133147" }, { "name": "98053", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/98053" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-08-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the CSS user subpage preview feature in MediaWiki before 1.23.15, 1.26.x before 1.26.4, and 1.27.x before 1.27.1 allows remote attackers to inject arbitrary web script or HTML via the edit box in Special:MyPage/common.css." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-04-28T09:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[MediaWiki-announce] 20160823 Security Release - 1.27.1, 1.26.4, 1.23.15", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2016-August/000195.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369613" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T133147" }, { "name": "98053", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/98053" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-6333", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the CSS user subpage preview feature in MediaWiki before 1.23.15, 1.26.x before 1.26.4, and 1.27.x before 1.27.1 allows remote attackers to inject arbitrary web script or HTML via the edit box in Special:MyPage/common.css." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[MediaWiki-announce] 20160823 Security Release - 1.27.1, 1.26.4, 1.23.15", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2016-August/000195.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1369613", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369613" }, { "name": "https://phabricator.wikimedia.org/T133147", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T133147" }, { "name": "98053", "refsource": "BID", "url": "http://www.securityfocus.com/bid/98053" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-6333", "datePublished": "2017-04-20T17:00:00", "dateReserved": "2016-07-26T00:00:00", "dateUpdated": "2024-08-06T01:29:19.303Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-5395
Vulnerability from cvelistv5
Published
2014-06-02 15:00
Modified
2024-08-06 21:05
Severity ?
EPSS score ?
Summary
Session fixation vulnerability in the CentralAuth extension for MediaWiki before 1.18.6, 1.19.x before 1.19.3, and 1.20.x before 1.20.1 allows remote attackers to hijack web sessions via the centralauth_Session cookie.
References
▼ | URL | Tags |
---|---|---|
https://bugzilla.wikimedia.org/show_bug.cgi?id=40962 | x_refsource_CONFIRM | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-November/000122.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:05:47.249Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=40962" }, { "name": "[MediaWiki-announce] 20121130 MediaWiki security release: 1.20.1, 1.19.3 and 1.18.6", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-November/000122.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-10-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Session fixation vulnerability in the CentralAuth extension for MediaWiki before 1.18.6, 1.19.x before 1.19.3, and 1.20.x before 1.20.1 allows remote attackers to hijack web sessions via the centralauth_Session cookie." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-06-02T14:57:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=40962" }, { "name": "[MediaWiki-announce] 20121130 MediaWiki security release: 1.20.1, 1.19.3 and 1.18.6", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-November/000122.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-5395", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Session fixation vulnerability in the CentralAuth extension for MediaWiki before 1.18.6, 1.19.x before 1.19.3, and 1.20.x before 1.20.1 allows remote attackers to hijack web sessions via the centralauth_Session cookie." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.wikimedia.org/show_bug.cgi?id=40962", "refsource": "CONFIRM", "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=40962" }, { "name": "[MediaWiki-announce] 20121130 MediaWiki security release: 1.20.1, 1.19.3 and 1.18.6", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-November/000122.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-5395", "datePublished": "2014-06-02T15:00:00", "dateReserved": "2012-10-17T00:00:00", "dateUpdated": "2024-08-06T21:05:47.249Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-8815
Vulnerability from cvelistv5
Published
2017-11-15 08:00
Modified
2024-08-05 16:48
Severity ?
EPSS score ?
Summary
The language converter in MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2 allows attribute injection attacks via glossary rules.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1039812 | vdb-entry, x_refsource_SECTRACK | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-November/000216.html | x_refsource_CONFIRM | |
https://www.debian.org/security/2017/dsa-4036 | vendor-advisory, x_refsource_DEBIAN |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2 |
Version: MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T16:48:21.919Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1039812", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039812" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-November/000216.html" }, { "name": "DSA-4036", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2017/dsa-4036" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2", "vendor": "n/a", "versions": [ { "status": "affected", "version": "MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2" } ] } ], "datePublic": "2017-11-15T00:00:00", "descriptions": [ { "lang": "en", "value": "The language converter in MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2 allows attribute injection attacks via glossary rules." } ], "problemTypes": [ { "descriptions": [ { "description": "attribute injection", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-16T10:57:01", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "name": "1039812", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039812" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-November/000216.html" }, { "name": "DSA-4036", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2017/dsa-4036" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "ID": "CVE-2017-8815", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2", "version": { "version_data": [ { "version_value": "MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The language converter in MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2 allows attribute injection attacks via glossary rules." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "attribute injection" } ] } ] }, "references": { "reference_data": [ { "name": "1039812", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039812" }, { "name": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-November/000216.html", "refsource": "CONFIRM", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-November/000216.html" }, { "name": "DSA-4036", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2017/dsa-4036" } ] } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2017-8815", "datePublished": "2017-11-15T08:00:00", "dateReserved": "2017-05-07T00:00:00", "dateUpdated": "2024-08-05T16:48:21.919Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-45372
Vulnerability from cvelistv5
Published
2023-10-09 00:00
Modified
2024-09-19 17:50
Severity ?
EPSS score ?
Summary
An issue was discovered in the Wikibase extension for MediaWiki before 1.35.12, 1.36.x through 1.39.x before 1.39.5, and 1.40.x before 1.40.1. During item merging, ItemMergeInteractor does not have an edit filter running (e.g., AbuseFilter).
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:21:16.371Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T345064" }, { "tags": [ "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Wikibase/+/961264" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-45372", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-19T17:46:55.485669Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-693", "description": "CWE-693 Protection Mechanism Failure", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-19T17:50:13.935Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the Wikibase extension for MediaWiki before 1.35.12, 1.36.x through 1.39.x before 1.39.5, and 1.40.x before 1.40.1. During item merging, ItemMergeInteractor does not have an edit filter running (e.g., AbuseFilter)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-09T05:32:40.875300", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T345064" }, { "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Wikibase/+/961264" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-45372", "datePublished": "2023-10-09T00:00:00", "dateReserved": "2023-10-09T00:00:00", "dateUpdated": "2024-09-19T17:50:13.935Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-28204
Vulnerability from cvelistv5
Published
2022-09-19 20:48
Modified
2024-08-03 05:48
Severity ?
EPSS score ?
Summary
A denial-of-service issue was discovered in MediaWiki 1.37.x before 1.37.2. Rendering of w/index.php?title=Special%3AWhatLinksHere&target=Property%3AP31&namespace=1&invert=1 can take more than thirty seconds. There is a DDoS risk.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T297754 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:48:37.419Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T297754" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A denial-of-service issue was discovered in MediaWiki 1.37.x before 1.37.2. Rendering of w/index.php?title=Special%3AWhatLinksHere\u0026target=Property%3AP31\u0026namespace=1\u0026invert=1 can take more than thirty seconds. There is a DDoS risk." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-19T20:48:09", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T297754" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-28204", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A denial-of-service issue was discovered in MediaWiki 1.37.x before 1.37.2. Rendering of w/index.php?title=Special%3AWhatLinksHere\u0026target=Property%3AP31\u0026namespace=1\u0026invert=1 can take more than thirty seconds. There is a DDoS risk." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T297754", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T297754" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-28204", "datePublished": "2022-09-19T20:48:09", "dateReserved": "2022-03-30T00:00:00", "dateUpdated": "2024-08-03T05:48:37.419Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-40601
Vulnerability from cvelistv5
Published
2024-07-06 00:00
Modified
2024-10-27 01:00
Severity ?
EPSS score ?
Summary
An issue was discovered in the MediaWikiChat extension for MediaWiki through 1.42.1. CSRF can occur in API modules.
References
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-40601", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-08T14:09:52.279968Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352 Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-27T01:00:28.962Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T04:33:11.796Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T362588" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the MediaWikiChat extension for MediaWiki through 1.42.1. CSRF can occur in API modules." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-06T23:26:36.043771", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T362588" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-40601", "datePublished": "2024-07-06T00:00:00", "dateReserved": "2024-07-06T00:00:00", "dateUpdated": "2024-10-27T01:00:28.962Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-25813
Vulnerability from cvelistv5
Published
2020-09-27 20:44
Modified
2024-08-04 15:40
Severity ?
EPSS score ?
Summary
In MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4, Special:UserRights exposes the existence of hidden users.
References
▼ | URL | Tags |
---|---|---|
https://meta.wikimedia.org/wiki/Special:UserRights | x_refsource_MISC | |
https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html | x_refsource_CONFIRM | |
https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html | x_refsource_MISC | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RTTPZ7XMDS66I442OLLHXBDNP2LCBJU6/ | vendor-advisory, x_refsource_FEDORA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:40:36.955Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://meta.wikimedia.org/wiki/Special:UserRights" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html" }, { "name": "FEDORA-2020-a4802c53d9", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RTTPZ7XMDS66I442OLLHXBDNP2LCBJU6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4, Special:UserRights exposes the existence of hidden users." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-14T02:06:11", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://meta.wikimedia.org/wiki/Special:UserRights" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html" }, { "name": "FEDORA-2020-a4802c53d9", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RTTPZ7XMDS66I442OLLHXBDNP2LCBJU6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-25813", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4, Special:UserRights exposes the existence of hidden users." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://meta.wikimedia.org/wiki/Special:UserRights", "refsource": "MISC", "url": "https://meta.wikimedia.org/wiki/Special:UserRights" }, { "name": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html", "refsource": "CONFIRM", "url": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html" }, { "name": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html", "refsource": "MISC", "url": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html" }, { "name": "FEDORA-2020-a4802c53d9", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RTTPZ7XMDS66I442OLLHXBDNP2LCBJU6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-25813", "datePublished": "2020-09-27T20:44:23", "dateReserved": "2020-09-23T00:00:00", "dateUpdated": "2024-08-04T15:40:36.955Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-1816
Vulnerability from cvelistv5
Published
2019-11-20 19:22
Modified
2024-08-06 15:13
Severity ?
EPSS score ?
Summary
MediaWiki before 1.19.4 and 1.20.x before 1.20.3 allows remote attackers to cause a denial of service (application crash) by sending a specially crafted request.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/58306 | vdb-entry, x_refsource_BID | |
https://security-tracker.debian.org/tracker/CVE-2013-1816 | x_refsource_MISC | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1816 | x_refsource_MISC | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/88360 | x_refsource_MISC | |
http://security.gentoo.org/glsa/glsa-201310-21.xml | x_refsource_MISC | |
http://www.openwall.com/lists/oss-security/2013/03/05/4 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:13:33.186Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "58306", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/58306" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-tracker.debian.org/tracker/CVE-2013-1816" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1816" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/88360" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201310-21.xml" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2013/03/05/4" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "mediawiki", "vendor": "mediawiki", "versions": [ { "status": "affected", "version": "1.19.4" }, { "status": "affected", "version": "1.20.3" } ] } ], "datePublic": "2013-03-04T00:00:00", "descriptions": [ { "lang": "en", "value": "MediaWiki before 1.19.4 and 1.20.x before 1.20.3 allows remote attackers to cause a denial of service (application crash) by sending a specially crafted request." } ], "problemTypes": [ { "descriptions": [ { "description": "Other", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-20T19:22:30", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "58306", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/58306" }, { "tags": [ "x_refsource_MISC" ], "url": "https://security-tracker.debian.org/tracker/CVE-2013-1816" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1816" }, { "tags": [ "x_refsource_MISC" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/88360" }, { "tags": [ "x_refsource_MISC" ], "url": "http://security.gentoo.org/glsa/glsa-201310-21.xml" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.openwall.com/lists/oss-security/2013/03/05/4" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-1816", "datePublished": "2019-11-20T19:22:30", "dateReserved": "2013-02-19T00:00:00", "dateUpdated": "2024-08-06T15:13:33.186Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-10534
Vulnerability from cvelistv5
Published
2020-03-12 22:14
Modified
2024-08-04 11:06
Severity ?
EPSS score ?
Summary
In the GlobalBlocking extension before 2020-03-10 for MediaWiki through 1.34.0, an issue related to IP range evaluation resulted in blocked users re-gaining escalated privileges. This is related to the case in which an IP address is contained in two ranges, one of which is locally disabled.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T229731 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/#/q/I9cc5fb2c08c78bbd797a5fc6d89f4577c8cc118b | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:06:09.447Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T229731" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/#/q/I9cc5fb2c08c78bbd797a5fc6d89f4577c8cc118b" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In the GlobalBlocking extension before 2020-03-10 for MediaWiki through 1.34.0, an issue related to IP range evaluation resulted in blocked users re-gaining escalated privileges. This is related to the case in which an IP address is contained in two ranges, one of which is locally disabled." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-12T22:14:41", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T229731" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/#/q/I9cc5fb2c08c78bbd797a5fc6d89f4577c8cc118b" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-10534", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In the GlobalBlocking extension before 2020-03-10 for MediaWiki through 1.34.0, an issue related to IP range evaluation resulted in blocked users re-gaining escalated privileges. This is related to the case in which an IP address is contained in two ranges, one of which is locally disabled." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T229731", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T229731" }, { "name": "https://gerrit.wikimedia.org/r/#/q/I9cc5fb2c08c78bbd797a5fc6d89f4577c8cc118b", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/#/q/I9cc5fb2c08c78bbd797a5fc6d89f4577c8cc118b" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-10534", "datePublished": "2020-03-12T22:14:41", "dateReserved": "2020-03-12T00:00:00", "dateUpdated": "2024-08-04T11:06:09.447Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-31556
Vulnerability from cvelistv5
Published
2021-08-12 21:38
Modified
2024-08-03 23:03
Severity ?
EPSS score ?
Summary
An issue was discovered in the Oauth extension for MediaWiki through 1.35.2. MWOAuthConsumerSubmitControl.php does not ensure that the length of an RSA key will fit in a MySQL blob.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T277380 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/I13ff0350a9a0a3cd5ab3e1f82dd0d8d9c13cf9e9 | x_refsource_MISC | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QNEAI2T3Y65I55ZB6UE6RMC662RZTGRX/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CJDYJQWT43GBD6GNQ4OW7JOZ6WQ6DZTN/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MDBPECBWN6LWNSWIQMVXK6PP4YFEUYHA/ | vendor-advisory, x_refsource_FEDORA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:03:33.356Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T277380" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/I13ff0350a9a0a3cd5ab3e1f82dd0d8d9c13cf9e9" }, { "name": "FEDORA-2021-eee8b7514f", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QNEAI2T3Y65I55ZB6UE6RMC662RZTGRX/" }, { "name": "FEDORA-2021-56d8173b5e", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CJDYJQWT43GBD6GNQ4OW7JOZ6WQ6DZTN/" }, { "name": "FEDORA-2021-3dd1b66cbf", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MDBPECBWN6LWNSWIQMVXK6PP4YFEUYHA/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the Oauth extension for MediaWiki through 1.35.2. MWOAuthConsumerSubmitControl.php does not ensure that the length of an RSA key will fit in a MySQL blob." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-30T01:06:58", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T277380" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/I13ff0350a9a0a3cd5ab3e1f82dd0d8d9c13cf9e9" }, { "name": "FEDORA-2021-eee8b7514f", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QNEAI2T3Y65I55ZB6UE6RMC662RZTGRX/" }, { "name": "FEDORA-2021-56d8173b5e", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CJDYJQWT43GBD6GNQ4OW7JOZ6WQ6DZTN/" }, { "name": "FEDORA-2021-3dd1b66cbf", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MDBPECBWN6LWNSWIQMVXK6PP4YFEUYHA/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-31556", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in the Oauth extension for MediaWiki through 1.35.2. MWOAuthConsumerSubmitControl.php does not ensure that the length of an RSA key will fit in a MySQL blob." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T277380", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T277380" }, { "name": "https://gerrit.wikimedia.org/r/q/I13ff0350a9a0a3cd5ab3e1f82dd0d8d9c13cf9e9", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/I13ff0350a9a0a3cd5ab3e1f82dd0d8d9c13cf9e9" }, { "name": "FEDORA-2021-eee8b7514f", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QNEAI2T3Y65I55ZB6UE6RMC662RZTGRX/" }, { "name": "FEDORA-2021-56d8173b5e", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CJDYJQWT43GBD6GNQ4OW7JOZ6WQ6DZTN/" }, { "name": "FEDORA-2021-3dd1b66cbf", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MDBPECBWN6LWNSWIQMVXK6PP4YFEUYHA/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-31556", "datePublished": "2021-08-12T21:38:44", "dateReserved": "2021-04-22T00:00:00", "dateUpdated": "2024-08-03T23:03:33.356Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-23178
Vulnerability from cvelistv5
Published
2024-01-12 00:00
Modified
2024-08-01 22:59
Severity ?
EPSS score ?
Summary
An issue was discovered in the Phonos extension in MediaWiki before 1.40.2. PhonosButton.js allows i18n-based XSS via the phonos-purge-needed-error message.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T22:59:31.836Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://lists.wikimedia.org/hyperkitty/list/mediawiki-announce%40lists.wikimedia.org/message/TDBUBCCOQJUT4SCHJNPHKQNPBUUETY52/" }, { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T349312" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the Phonos extension in MediaWiki before 1.40.2. PhonosButton.js allows i18n-based XSS via the phonos-purge-needed-error message." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-12T05:14:20.262329", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://lists.wikimedia.org/hyperkitty/list/mediawiki-announce%40lists.wikimedia.org/message/TDBUBCCOQJUT4SCHJNPHKQNPBUUETY52/" }, { "url": "https://phabricator.wikimedia.org/T349312" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-23178", "datePublished": "2024-01-12T00:00:00", "dateReserved": "2024-01-12T00:00:00", "dateUpdated": "2024-08-01T22:59:31.836Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-0366
Vulnerability from cvelistv5
Published
2018-04-13 16:00
Modified
2024-09-16 16:13
Severity ?
EPSS score ?
Summary
Mediawiki before 1.28.1 / 1.27.2 / 1.23.16 contains a flaw allowing to evade SVG filter using default attribute values in DTD declaration.
References
▼ | URL | Tags |
---|---|---|
https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html | mailing-list, x_refsource_MLIST | |
https://phabricator.wikimedia.org/T151735 | x_refsource_CONFIRM | |
https://security-tracker.debian.org/tracker/CVE-2017-0366 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T13:03:57.058Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[mediawiki-announce] 20170406 Security Release: 1.28.1 / 1.27.2 / 1.23.16", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T151735" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security-tracker.debian.org/tracker/CVE-2017-0366" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "mediawiki", "vendor": "mediawiki", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-04-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Mediawiki before 1.28.1 / 1.27.2 / 1.23.16 contains a flaw allowing to evade SVG filter using default attribute values in DTD declaration." } ], "problemTypes": [ { "descriptions": [ { "description": "bypass filter", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-04-13T15:57:01", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "name": "[mediawiki-announce] 20170406 Security Release: 1.28.1 / 1.27.2 / 1.23.16", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T151735" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security-tracker.debian.org/tracker/CVE-2017-0366" } ], "source": { "advisory": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html", "discovery": "UNKNOWN" }, "title": "SVG filter evasion using default attribute values in DTD declaration", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "DATE_PUBLIC": "2017-04-06T20:49:00.000Z", "ID": "CVE-2017-0366", "STATE": "PUBLIC", "TITLE": "SVG filter evasion using default attribute values in DTD declaration" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "mediawiki", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "mediawiki" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Mediawiki before 1.28.1 / 1.27.2 / 1.23.16 contains a flaw allowing to evade SVG filter using default attribute values in DTD declaration." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "bypass filter" } ] } ] }, "references": { "reference_data": [ { "name": "[mediawiki-announce] 20170406 Security Release: 1.28.1 / 1.27.2 / 1.23.16", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html" }, { "name": "https://phabricator.wikimedia.org/T151735", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T151735" }, { "name": "https://security-tracker.debian.org/tracker/CVE-2017-0366", "refsource": "CONFIRM", "url": "https://security-tracker.debian.org/tracker/CVE-2017-0366" } ] }, "source": { "advisory": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2017-0366", "datePublished": "2018-04-13T16:00:00Z", "dateReserved": "2016-11-29T00:00:00", "dateUpdated": "2024-09-16T16:13:20.587Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-37256
Vulnerability from cvelistv5
Published
2023-06-29 00:00
Modified
2024-11-26 19:35
Severity ?
EPSS score ?
Summary
An issue was discovered in the Cargo extension for MediaWiki through 1.39.3. It allows one to store javascript: URLs in URL fields, and automatically links these URLs.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:09:33.135Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T331311" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-37256", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-26T19:33:53.973360Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-26T19:35:42.623Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the Cargo extension for MediaWiki through 1.39.3. It allows one to store javascript: URLs in URL fields, and automatically links these URLs." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-29T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T331311" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-37256", "datePublished": "2023-06-29T00:00:00", "dateReserved": "2023-06-29T00:00:00", "dateUpdated": "2024-11-26T19:35:42.623Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-1610
Vulnerability from cvelistv5
Published
2014-01-30 23:00
Modified
2024-08-06 09:50
Severity ?
EPSS score ?
Summary
MediaWiki 1.22.x before 1.22.2, 1.21.x before 1.21.5, and 1.19.x before 1.19.11, when DjVu or PDF file upload support is enabled, allows remote attackers to execute arbitrary commands via shell metacharacters in (1) the page parameter to includes/media/DjVu.php; (2) the w parameter (aka width field) to thumb.php, which is not properly handled by includes/media/PdfHandler_body.php; and possibly unspecified vectors in (3) includes/media/Bitmap.php and (4) includes/media/ImageHandler.php.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T09:50:09.575Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "31329", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/31329/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.checkpoint.com/threatcloud-central/articles/2014-01-28-tc-researchers-discover.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.checkpoint.com/defense/advisories/public/2014/cpai-26-jan.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=60339" }, { "name": "57472", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/57472" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/#/c/110215/" }, { "name": "DSA-2891", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-2891" }, { "name": "[MediaWiki-announce] 20140128 MediaWiki Security Releases: 1.22.2, 1.21.5 and 1.19.11", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000140.html" }, { "name": "1029707", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1029707" }, { "name": "65223", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/65223" }, { "name": "FEDORA-2014-1802", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127942.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/#/c/110069/2/includes/media/Bitmap.php" }, { "name": "102631", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/102631" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/attachment.cgi?id=14361\u0026action=diff" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/attachment.cgi?id=14384\u0026action=diff" }, { "name": "56695", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/56695" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/#/c/110069/" }, { "name": "102630", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/102630" }, { "name": "FEDORA-2014-1745", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127948.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-01-28T00:00:00", "descriptions": [ { "lang": "en", "value": "MediaWiki 1.22.x before 1.22.2, 1.21.x before 1.21.5, and 1.19.x before 1.19.11, when DjVu or PDF file upload support is enabled, allows remote attackers to execute arbitrary commands via shell metacharacters in (1) the page parameter to includes/media/DjVu.php; (2) the w parameter (aka width field) to thumb.php, which is not properly handled by includes/media/PdfHandler_body.php; and possibly unspecified vectors in (3) includes/media/Bitmap.php and (4) includes/media/ImageHandler.php." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-11-16T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "31329", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/31329/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.checkpoint.com/threatcloud-central/articles/2014-01-28-tc-researchers-discover.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.checkpoint.com/defense/advisories/public/2014/cpai-26-jan.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=60339" }, { "name": "57472", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/57472" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/#/c/110215/" }, { "name": "DSA-2891", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-2891" }, { "name": "[MediaWiki-announce] 20140128 MediaWiki Security Releases: 1.22.2, 1.21.5 and 1.19.11", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000140.html" }, { "name": "1029707", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1029707" }, { "name": "65223", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/65223" }, { "name": "FEDORA-2014-1802", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127942.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/#/c/110069/2/includes/media/Bitmap.php" }, { "name": "102631", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/102631" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.wikimedia.org/attachment.cgi?id=14361\u0026action=diff" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.wikimedia.org/attachment.cgi?id=14384\u0026action=diff" }, { "name": "56695", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/56695" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/#/c/110069/" }, { "name": "102630", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/102630" }, { "name": "FEDORA-2014-1745", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127948.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-1610", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MediaWiki 1.22.x before 1.22.2, 1.21.x before 1.21.5, and 1.19.x before 1.19.11, when DjVu or PDF file upload support is enabled, allows remote attackers to execute arbitrary commands via shell metacharacters in (1) the page parameter to includes/media/DjVu.php; (2) the w parameter (aka width field) to thumb.php, which is not properly handled by includes/media/PdfHandler_body.php; and possibly unspecified vectors in (3) includes/media/Bitmap.php and (4) includes/media/ImageHandler.php." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "31329", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/31329/" }, { "name": "http://www.checkpoint.com/threatcloud-central/articles/2014-01-28-tc-researchers-discover.html", "refsource": "MISC", "url": "http://www.checkpoint.com/threatcloud-central/articles/2014-01-28-tc-researchers-discover.html" }, { "name": "http://www.checkpoint.com/defense/advisories/public/2014/cpai-26-jan.html", "refsource": "MISC", "url": "http://www.checkpoint.com/defense/advisories/public/2014/cpai-26-jan.html" }, { "name": "https://bugzilla.wikimedia.org/show_bug.cgi?id=60339", "refsource": "CONFIRM", "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=60339" }, { "name": "57472", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/57472" }, { "name": "https://gerrit.wikimedia.org/r/#/c/110215/", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/#/c/110215/" }, { "name": "DSA-2891", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-2891" }, { "name": "[MediaWiki-announce] 20140128 MediaWiki Security Releases: 1.22.2, 1.21.5 and 1.19.11", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000140.html" }, { "name": "1029707", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1029707" }, { "name": "65223", "refsource": "BID", "url": "http://www.securityfocus.com/bid/65223" }, { "name": "FEDORA-2014-1802", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127942.html" }, { "name": "https://gerrit.wikimedia.org/r/#/c/110069/2/includes/media/Bitmap.php", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/#/c/110069/2/includes/media/Bitmap.php" }, { "name": "102631", "refsource": "OSVDB", "url": "http://www.osvdb.org/102631" }, { "name": "https://bugzilla.wikimedia.org/attachment.cgi?id=14361\u0026action=diff", "refsource": "MISC", "url": "https://bugzilla.wikimedia.org/attachment.cgi?id=14361\u0026action=diff" }, { "name": "https://bugzilla.wikimedia.org/attachment.cgi?id=14384\u0026action=diff", "refsource": "MISC", "url": "https://bugzilla.wikimedia.org/attachment.cgi?id=14384\u0026action=diff" }, { "name": "56695", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/56695" }, { "name": "https://gerrit.wikimedia.org/r/#/c/110069/", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/#/c/110069/" }, { "name": "102630", "refsource": "OSVDB", "url": "http://osvdb.org/102630" }, { "name": "FEDORA-2014-1745", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127948.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-1610", "datePublished": "2014-01-30T23:00:00", "dateReserved": "2014-01-19T00:00:00", "dateUpdated": "2024-08-06T09:50:09.575Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-6332
Vulnerability from cvelistv5
Published
2017-04-20 17:00
Modified
2024-08-06 01:29
Severity ?
EPSS score ?
Summary
MediaWiki before 1.23.15, 1.26.x before 1.26.4, and 1.27.x before 1.27.1, when $wgBlockDisablesLogin is true, might allow remote attackers to obtain sensitive information by leveraging failure to terminate sessions when a user account is blocked.
References
▼ | URL | Tags |
---|---|---|
https://lists.wikimedia.org/pipermail/mediawiki-announce/2016-August/000195.html | mailing-list, x_refsource_MLIST | |
https://bugzilla.redhat.com/show_bug.cgi?id=1369613 | x_refsource_CONFIRM | |
https://phabricator.wikimedia.org/T129738 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:29:19.298Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[MediaWiki-announce] 20160823 Security Release - 1.27.1, 1.26.4, 1.23.15", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2016-August/000195.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369613" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T129738" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-08-23T00:00:00", "descriptions": [ { "lang": "en", "value": "MediaWiki before 1.23.15, 1.26.x before 1.26.4, and 1.27.x before 1.27.1, when $wgBlockDisablesLogin is true, might allow remote attackers to obtain sensitive information by leveraging failure to terminate sessions when a user account is blocked." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-04-20T16:57:02", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[MediaWiki-announce] 20160823 Security Release - 1.27.1, 1.26.4, 1.23.15", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2016-August/000195.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369613" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T129738" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-6332", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MediaWiki before 1.23.15, 1.26.x before 1.26.4, and 1.27.x before 1.27.1, when $wgBlockDisablesLogin is true, might allow remote attackers to obtain sensitive information by leveraging failure to terminate sessions when a user account is blocked." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[MediaWiki-announce] 20160823 Security Release - 1.27.1, 1.26.4, 1.23.15", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2016-August/000195.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1369613", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369613" }, { "name": "https://phabricator.wikimedia.org/T129738", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T129738" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-6332", "datePublished": "2017-04-20T17:00:00", "dateReserved": "2016-07-26T00:00:00", "dateUpdated": "2024-08-06T01:29:19.298Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-1055
Vulnerability from cvelistv5
Published
2007-02-21 23:00
Modified
2024-08-07 12:43
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in the AJAX features in index.php in MediaWiki 1.9.x before 1.9.0rc2, and 1.8.2 and earlier allows remote attackers to inject arbitrary web script or HTML via the rs parameter. NOTE: this issue might be a duplicate of CVE-2007-0177.
References
▼ | URL | Tags |
---|---|---|
http://www.bugsec.com/articles.php?Security=24 | x_refsource_MISC | |
http://www.securityfocus.com/archive/1/460596/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://securityreason.com/securityalert/2274 | third-party-advisory, x_refsource_SREASON | |
http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_9_0/phase3/RELEASE-NOTES | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/32586 | vdb-entry, x_refsource_XF | |
http://osvdb.org/37343 | vdb-entry, x_refsource_OSVDB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T12:43:22.463Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.bugsec.com/articles.php?Security=24" }, { "name": "20070220 MediaWiki Cross-site Scripting", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/460596/100/0/threaded" }, { "name": "2274", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/2274" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_9_0/phase3/RELEASE-NOTES" }, { "name": "mediawiki-index-xss(32586)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32586" }, { "name": "37343", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/37343" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-01-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the AJAX features in index.php in MediaWiki 1.9.x before 1.9.0rc2, and 1.8.2 and earlier allows remote attackers to inject arbitrary web script or HTML via the rs parameter. NOTE: this issue might be a duplicate of CVE-2007-0177." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.bugsec.com/articles.php?Security=24" }, { "name": "20070220 MediaWiki Cross-site Scripting", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/460596/100/0/threaded" }, { "name": "2274", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/2274" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_9_0/phase3/RELEASE-NOTES" }, { "name": "mediawiki-index-xss(32586)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32586" }, { "name": "37343", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/37343" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-1055", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the AJAX features in index.php in MediaWiki 1.9.x before 1.9.0rc2, and 1.8.2 and earlier allows remote attackers to inject arbitrary web script or HTML via the rs parameter. NOTE: this issue might be a duplicate of CVE-2007-0177." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.bugsec.com/articles.php?Security=24", "refsource": "MISC", "url": "http://www.bugsec.com/articles.php?Security=24" }, { "name": "20070220 MediaWiki Cross-site Scripting", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/460596/100/0/threaded" }, { "name": "2274", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/2274" }, { "name": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_9_0/phase3/RELEASE-NOTES", "refsource": "CONFIRM", "url": "http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_9_0/phase3/RELEASE-NOTES" }, { "name": "mediawiki-index-xss(32586)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32586" }, { "name": "37343", "refsource": "OSVDB", "url": "http://osvdb.org/37343" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-1055", "datePublished": "2007-02-21T23:00:00", "dateReserved": "2007-02-21T00:00:00", "dateUpdated": "2024-08-07T12:43:22.463Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-6454
Vulnerability from cvelistv5
Published
2014-05-12 14:00
Modified
2024-08-06 17:39
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in MediaWiki before 1.19.10, 1.2x before 1.21.4, and 1.22.x before 1.22.1 allows remote attackers to inject arbitrary web script or HTML via a -o-link attribute.
References
▼ | URL | Tags |
---|---|---|
http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000138.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T17:39:01.286Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[MediaWiki-announce] 20140114 MediaWiki Security Releases: 1.22.1, 1.21.4 and 1.19.10", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000138.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-01-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in MediaWiki before 1.19.10, 1.2x before 1.21.4, and 1.22.x before 1.22.1 allows remote attackers to inject arbitrary web script or HTML via a -o-link attribute." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-05-12T13:57:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[MediaWiki-announce] 20140114 MediaWiki Security Releases: 1.22.1, 1.21.4 and 1.19.10", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000138.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-6454", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in MediaWiki before 1.19.10, 1.2x before 1.21.4, and 1.22.x before 1.22.1 allows remote attackers to inject arbitrary web script or HTML via a -o-link attribute." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[MediaWiki-announce] 20140114 MediaWiki Security Releases: 1.22.1, 1.21.4 and 1.19.10", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000138.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-6454", "datePublished": "2014-05-12T14:00:00", "dateReserved": "2013-11-04T00:00:00", "dateUpdated": "2024-08-06T17:39:01.286Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-35623
Vulnerability from cvelistv5
Published
2020-12-21 22:37
Modified
2024-08-04 17:09
Severity ?
EPSS score ?
Summary
An issue was discovered in the CasAuth extension for MediaWiki through 1.35.1. Due to improper username validation, it allowed user impersonation with trivial manipulations of certain characters within a given username. An ordinary user may be able to login as a "bureaucrat user" who has a similar username, as demonstrated by usernames that differ only in (1) bidirectional override symbols or (2) blank space.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T263498 | x_refsource_MISC | |
https://github.com/CWRUChielLab/CASAuth/pull/11 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:09:14.084Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T263498" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/CWRUChielLab/CASAuth/pull/11" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the CasAuth extension for MediaWiki through 1.35.1. Due to improper username validation, it allowed user impersonation with trivial manipulations of certain characters within a given username. An ordinary user may be able to login as a \"bureaucrat user\" who has a similar username, as demonstrated by usernames that differ only in (1) bidirectional override symbols or (2) blank space." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-21T22:37:15", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T263498" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/CWRUChielLab/CASAuth/pull/11" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-35623", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in the CasAuth extension for MediaWiki through 1.35.1. Due to improper username validation, it allowed user impersonation with trivial manipulations of certain characters within a given username. An ordinary user may be able to login as a \"bureaucrat user\" who has a similar username, as demonstrated by usernames that differ only in (1) bidirectional override symbols or (2) blank space." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T263498", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T263498" }, { "name": "https://github.com/CWRUChielLab/CASAuth/pull/11", "refsource": "MISC", "url": "https://github.com/CWRUChielLab/CASAuth/pull/11" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-35623", "datePublished": "2020-12-21T22:37:15", "dateReserved": "2020-12-21T00:00:00", "dateUpdated": "2024-08-04T17:09:14.084Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-9481
Vulnerability from cvelistv5
Published
2020-01-27 15:38
Modified
2024-08-06 13:47
Severity ?
EPSS score ?
Summary
The Scribunto extension for MediaWiki allows remote attackers to obtain the rollback token and possibly other sensitive information via a crafted module, related to unstripping special page HTML.
References
▼ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2014/12/21/2 | x_refsource_MISC | |
http://www.openwall.com/lists/oss-security/2015/01/03/13 | x_refsource_MISC | |
https://phabricator.wikimedia.org/T73167 | x_refsource_MISC | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-December/000173.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:47:41.063Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/12/21/2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/01/03/13" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T73167" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-December/000173.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Scribunto", "vendor": "Scribunto", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-12-17T00:00:00", "descriptions": [ { "lang": "en", "value": "The Scribunto extension for MediaWiki allows remote attackers to obtain the rollback token and possibly other sensitive information via a crafted module, related to unstripping special page HTML." } ], "problemTypes": [ { "descriptions": [ { "description": "Other", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-01-27T15:38:50", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.openwall.com/lists/oss-security/2014/12/21/2" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.openwall.com/lists/oss-security/2015/01/03/13" }, { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T73167" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-December/000173.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "ID": "CVE-2014-9481", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Scribunto", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Scribunto" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Scribunto extension for MediaWiki allows remote attackers to obtain the rollback token and possibly other sensitive information via a crafted module, related to unstripping special page HTML." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Other" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.openwall.com/lists/oss-security/2014/12/21/2", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2014/12/21/2" }, { "name": "http://www.openwall.com/lists/oss-security/2015/01/03/13", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2015/01/03/13" }, { "name": "https://phabricator.wikimedia.org/T73167", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T73167" }, { "name": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-December/000173.html", "refsource": "CONFIRM", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-December/000173.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2014-9481", "datePublished": "2020-01-27T15:38:50", "dateReserved": "2015-01-03T00:00:00", "dateUpdated": "2024-08-06T13:47:41.063Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-0369
Vulnerability from cvelistv5
Published
2018-04-13 16:00
Modified
2024-09-16 20:58
Severity ?
EPSS score ?
Summary
Mediawiki before 1.28.1 / 1.27.2 / 1.23.16 contains a flaw, allowing a sysops to undelete pages, although the page is protected against it.
References
▼ | URL | Tags |
---|---|---|
https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html | mailing-list, x_refsource_MLIST | |
https://security-tracker.debian.org/tracker/CVE-2017-0369 | x_refsource_CONFIRM | |
https://phabricator.wikimedia.org/T108138 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T13:03:56.986Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[mediawiki-announce] 20170406 Security Release: 1.28.1 / 1.27.2 / 1.23.16", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security-tracker.debian.org/tracker/CVE-2017-0369" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T108138" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "mediawiki", "vendor": "mediawiki", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-04-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Mediawiki before 1.28.1 / 1.27.2 / 1.23.16 contains a flaw, allowing a sysops to undelete pages, although the page is protected against it." } ], "problemTypes": [ { "descriptions": [ { "description": "restriction bypass", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-04-13T15:57:01", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "name": "[mediawiki-announce] 20170406 Security Release: 1.28.1 / 1.27.2 / 1.23.16", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security-tracker.debian.org/tracker/CVE-2017-0369" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T108138" } ], "source": { "advisory": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html", "discovery": "UNKNOWN" }, "title": "Sysops can undelete pages, although the page is protected against it", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "DATE_PUBLIC": "2017-04-06T20:49:00.000Z", "ID": "CVE-2017-0369", "STATE": "PUBLIC", "TITLE": "Sysops can undelete pages, although the page is protected against it" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "mediawiki", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "mediawiki" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Mediawiki before 1.28.1 / 1.27.2 / 1.23.16 contains a flaw, allowing a sysops to undelete pages, although the page is protected against it." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "restriction bypass" } ] } ] }, "references": { "reference_data": [ { "name": "[mediawiki-announce] 20170406 Security Release: 1.28.1 / 1.27.2 / 1.23.16", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html" }, { "name": "https://security-tracker.debian.org/tracker/CVE-2017-0369", "refsource": "CONFIRM", "url": "https://security-tracker.debian.org/tracker/CVE-2017-0369" }, { "name": "https://phabricator.wikimedia.org/T108138", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T108138" } ] }, "source": { "advisory": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2017-0369", "datePublished": "2018-04-13T16:00:00Z", "dateReserved": "2016-11-29T00:00:00", "dateUpdated": "2024-09-16T20:58:15.383Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-9276
Vulnerability from cvelistv5
Published
2015-01-04 21:00
Modified
2024-08-06 13:40
Severity ?
EPSS score ?
Summary
Cross-site request forgery (CSRF) vulnerability in the Special:ExpandedTemplates page in MediaWiki before 1.19.22, 1.20.x through 1.22.x before 1.22.14, and 1.23.x before 1.23.7, when $wgRawHTML is set to true, allows remote attackers to hijack the authentication of users with edit permissions for requests that cross-site scripting (XSS) attacks via the wpInput parameter, which is not properly handled in the preview.
References
▼ | URL | Tags |
---|---|---|
http://securitytracker.com/id?1031301 | vdb-entry, x_refsource_SECTRACK | |
http://www.openwall.com/lists/oss-security/2014/12/03/9 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2014/12/04/16 | mailing-list, x_refsource_MLIST | |
https://phabricator.wikimedia.org/T73111 | x_refsource_CONFIRM | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-November/000170.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:40:24.980Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1031301", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1031301" }, { "name": "[oss-security] 20141203 MediaWiki security release - 1.23.7", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/12/03/9" }, { "name": "[oss-security] 20141204 Re: MediaWiki security release - 1.23.7", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/12/04/16" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T73111" }, { "name": "[MediaWiki-announce] 20141127 MediaWiki Security and Maintenance Releases: 1.23.7, 1.22.14 and 1.19.22", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-November/000170.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-11-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability in the Special:ExpandedTemplates page in MediaWiki before 1.19.22, 1.20.x through 1.22.x before 1.22.14, and 1.23.x before 1.23.7, when $wgRawHTML is set to true, allows remote attackers to hijack the authentication of users with edit permissions for requests that cross-site scripting (XSS) attacks via the wpInput parameter, which is not properly handled in the preview." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-01-04T20:57:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1031301", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1031301" }, { "name": "[oss-security] 20141203 MediaWiki security release - 1.23.7", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/12/03/9" }, { "name": "[oss-security] 20141204 Re: MediaWiki security release - 1.23.7", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/12/04/16" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T73111" }, { "name": "[MediaWiki-announce] 20141127 MediaWiki Security and Maintenance Releases: 1.23.7, 1.22.14 and 1.19.22", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-November/000170.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-9276", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site request forgery (CSRF) vulnerability in the Special:ExpandedTemplates page in MediaWiki before 1.19.22, 1.20.x through 1.22.x before 1.22.14, and 1.23.x before 1.23.7, when $wgRawHTML is set to true, allows remote attackers to hijack the authentication of users with edit permissions for requests that cross-site scripting (XSS) attacks via the wpInput parameter, which is not properly handled in the preview." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1031301", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1031301" }, { "name": "[oss-security] 20141203 MediaWiki security release - 1.23.7", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/12/03/9" }, { "name": "[oss-security] 20141204 Re: MediaWiki security release - 1.23.7", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/12/04/16" }, { "name": "https://phabricator.wikimedia.org/T73111", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T73111" }, { "name": "[MediaWiki-announce] 20141127 MediaWiki Security and Maintenance Releases: 1.23.7, 1.22.14 and 1.19.22", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-November/000170.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-9276", "datePublished": "2015-01-04T21:00:00", "dateReserved": "2014-12-04T00:00:00", "dateUpdated": "2024-08-06T13:40:24.980Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-31551
Vulnerability from cvelistv5
Published
2021-04-22 02:29
Modified
2024-08-03 23:03
Severity ?
EPSS score ?
Summary
An issue was discovered in the PageForms extension for MediaWiki through 1.35.2. Crafted payloads for Token-related query parameters allowed for XSS on certain PageForms-managed MediaWiki pages.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T259433 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/Ibe68b070ee791cd0c8e7f50eb04ac4e066b1512c | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/I5e0abbc2f80e6bda255b3b32a4df39a7fe7d3793 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/I20b63bd38779d2ccbe2d86f9879df85ca3b685f6 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:03:33.439Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T259433" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/Ibe68b070ee791cd0c8e7f50eb04ac4e066b1512c" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/I5e0abbc2f80e6bda255b3b32a4df39a7fe7d3793" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/I20b63bd38779d2ccbe2d86f9879df85ca3b685f6" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the PageForms extension for MediaWiki through 1.35.2. Crafted payloads for Token-related query parameters allowed for XSS on certain PageForms-managed MediaWiki pages." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-22T02:29:51", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T259433" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/Ibe68b070ee791cd0c8e7f50eb04ac4e066b1512c" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/I5e0abbc2f80e6bda255b3b32a4df39a7fe7d3793" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/I20b63bd38779d2ccbe2d86f9879df85ca3b685f6" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-31551", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in the PageForms extension for MediaWiki through 1.35.2. Crafted payloads for Token-related query parameters allowed for XSS on certain PageForms-managed MediaWiki pages." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T259433", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T259433" }, { "name": "https://gerrit.wikimedia.org/r/q/Ibe68b070ee791cd0c8e7f50eb04ac4e066b1512c", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/Ibe68b070ee791cd0c8e7f50eb04ac4e066b1512c" }, { "name": "https://gerrit.wikimedia.org/r/q/I5e0abbc2f80e6bda255b3b32a4df39a7fe7d3793", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/I5e0abbc2f80e6bda255b3b32a4df39a7fe7d3793" }, { "name": "https://gerrit.wikimedia.org/r/q/I20b63bd38779d2ccbe2d86f9879df85ca3b685f6", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/I20b63bd38779d2ccbe2d86f9879df85ca3b685f6" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-31551", "datePublished": "2021-04-22T02:29:51", "dateReserved": "2021-04-22T00:00:00", "dateUpdated": "2024-08-03T23:03:33.439Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-45038
Vulnerability from cvelistv5
Published
2021-12-17 00:00
Modified
2024-08-04 04:32
Severity ?
EPSS score ?
Summary
An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. By using an action=rollback query, attackers can view private wiki contents.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:32:13.621Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T297574" }, { "tags": [ "x_transferred" ], "url": "https://www.mediawiki.org/wiki/2021-12_security_release/FAQ" }, { "name": "GLSA-202305-24", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202305-24" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36.3, and 1.37.x before 1.37.1. By using an action=rollback query, attackers can view private wiki contents." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-21T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T297574" }, { "url": "https://www.mediawiki.org/wiki/2021-12_security_release/FAQ" }, { "name": "GLSA-202305-24", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202305-24" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-45038", "datePublished": "2021-12-17T00:00:00", "dateReserved": "2021-12-13T00:00:00", "dateUpdated": "2024-08-04T04:32:13.621Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-6729
Vulnerability from cvelistv5
Published
2015-09-01 14:00
Modified
2024-08-06 07:29
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in thumb.php in MediaWiki before 1.23.10, 1.24.x before 1.24.3, and 1.25.x before 1.25.2 allows remote attackers to inject arbitrary web script or HTML via the rel404 parameter, which is not properly handled in an error page.
References
▼ | URL | Tags |
---|---|---|
https://security.gentoo.org/glsa/201510-05 | vendor-advisory, x_refsource_GENTOO | |
http://www.openwall.com/lists/oss-security/2015/08/27/6 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2015/08/12/6 | mailing-list, x_refsource_MLIST | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-August/000179.html | mailing-list, x_refsource_MLIST | |
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165193.html | vendor-advisory, x_refsource_FEDORA | |
http://www.securityfocus.com/bid/76334 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:29:24.496Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201510-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201510-05" }, { "name": "[oss-security] 20150827 Re: CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/08/27/6" }, { "name": "[oss-security] 20150812 CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/08/12/6" }, { "name": "[MediaWiki-announce] 20150810 MediaWiki Security and Maintenance Releases: 1.25.2, 1.24.3, 1.23.10", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-August/000179.html" }, { "name": "FEDORA-2015-13920", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165193.html" }, { "name": "76334", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/76334" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-08-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in thumb.php in MediaWiki before 1.23.10, 1.24.x before 1.24.3, and 1.25.x before 1.25.2 allows remote attackers to inject arbitrary web script or HTML via the rel404 parameter, which is not properly handled in an error page." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-05T21:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "GLSA-201510-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201510-05" }, { "name": "[oss-security] 20150827 Re: CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/08/27/6" }, { "name": "[oss-security] 20150812 CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/08/12/6" }, { "name": "[MediaWiki-announce] 20150810 MediaWiki Security and Maintenance Releases: 1.25.2, 1.24.3, 1.23.10", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-August/000179.html" }, { "name": "FEDORA-2015-13920", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165193.html" }, { "name": "76334", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/76334" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-6729", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in thumb.php in MediaWiki before 1.23.10, 1.24.x before 1.24.3, and 1.25.x before 1.25.2 allows remote attackers to inject arbitrary web script or HTML via the rel404 parameter, which is not properly handled in an error page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201510-05", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201510-05" }, { "name": "[oss-security] 20150827 Re: CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/08/27/6" }, { "name": "[oss-security] 20150812 CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/08/12/6" }, { "name": "[MediaWiki-announce] 20150810 MediaWiki Security and Maintenance Releases: 1.25.2, 1.24.3, 1.23.10", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-August/000179.html" }, { "name": "FEDORA-2015-13920", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165193.html" }, { "name": "76334", "refsource": "BID", "url": "http://www.securityfocus.com/bid/76334" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-6729", "datePublished": "2015-09-01T14:00:00", "dateReserved": "2015-08-27T00:00:00", "dateUpdated": "2024-08-06T07:29:24.496Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-45360
Vulnerability from cvelistv5
Published
2023-11-03 00:00
Modified
2024-08-02 20:21
Severity ?
EPSS score ?
Summary
An issue was discovered in MediaWiki before 1.35.12, 1.36.x through 1.39.x before 1.39.5, and 1.40.x before 1.40.1. There is XSS in youhavenewmessagesmanyusers and youhavenewmessages i18n messages. This is related to MediaWiki:Youhavenewmessagesfromusers.
References
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "mediawiki", "vendor": "mediawiki", "versions": [ { "lessThan": "1.35.12", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "1.39.5", "status": "affected", "version": "1.36.0", "versionType": "custom" }, { "lessThan": "1.40.1", "status": "affected", "version": "1.40.0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-45360", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-11T14:08:22.103632Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-11T14:12:18.211Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T20:21:16.159Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T340221" }, { "name": "FEDORA-2024-2c564b942d", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FU2FGUXXK6TMV6R52VRECLC6XCSQQISY/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in MediaWiki before 1.35.12, 1.36.x through 1.39.x before 1.39.5, and 1.40.x before 1.40.1. There is XSS in youhavenewmessagesmanyusers and youhavenewmessages i18n messages. This is related to MediaWiki:Youhavenewmessagesfromusers." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-10T16:13:34.500184", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T340221" }, { "name": "FEDORA-2024-2c564b942d", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FU2FGUXXK6TMV6R52VRECLC6XCSQQISY/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-45360", "datePublished": "2023-11-03T00:00:00", "dateReserved": "2023-10-09T00:00:00", "dateUpdated": "2024-08-02T20:21:16.159Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-23173
Vulnerability from cvelistv5
Published
2024-01-12 00:00
Modified
2024-08-01 22:59
Severity ?
EPSS score ?
Summary
An issue was discovered in the Cargo extension in MediaWiki before 1.35.14, 1.36.x through 1.39.x before 1.39.6, and 1.40.x before 1.40.2. The Special:Drilldown page allows XSS via artist, album, and position parameters because of applied filter values in drilldown/CargoAppliedFilter.php.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T22:59:31.830Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T348687" }, { "tags": [ "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Cargo/+/965214" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the Cargo extension in MediaWiki before 1.35.14, 1.36.x through 1.39.x before 1.39.6, and 1.40.x before 1.40.2. The Special:Drilldown page allows XSS via artist, album, and position parameters because of applied filter values in drilldown/CargoAppliedFilter.php." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-12T04:39:53.663943", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T348687" }, { "url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Cargo/+/965214" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-23173", "datePublished": "2024-01-12T00:00:00", "dateReserved": "2024-01-12T00:00:00", "dateUpdated": "2024-08-01T22:59:31.830Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-2698
Vulnerability from cvelistv5
Published
2012-06-29 19:00
Modified
2024-08-06 19:42
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in the outputPage function in includes/SkinTemplate.php in MediaWiki before 1.17.5, 1.18.x before 1.18.4, and 1.19.x before 1.19.1 allows remote attackers to inject arbitrary web script or HTML via the uselang parameter to index.php/Main_page.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:42:31.984Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[MediaWiki-announce] 20120613 MediaWiki security release 1.17.5", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-June/000116.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mediawiki.org/wiki/Release_notes/1.18" }, { "name": "82983", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/82983" }, { "name": "[MediaWiki-announce] 20120613 MediaWiki security release 1.18.4", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-June/000117.html" }, { "name": "49484", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49484" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=36938" }, { "name": "1027179", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1027179" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mediawiki.org/wiki/Release_notes/1.19" }, { "name": "mediawiki-index-uselang-xss(76311)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76311" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mediawiki.org/wiki/Release_notes/1.17" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/#/c/7979/1/includes/SkinTemplate.php" }, { "name": "[oss-security] 20120613 Re: CVE request: XSS in uselang http parameter (mediawiki)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/06/14/2" }, { "name": "[MediaWiki-announce] 20120613 MediaWiki security release 1.19.1", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-June/000118.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-06-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the outputPage function in includes/SkinTemplate.php in MediaWiki before 1.17.5, 1.18.x before 1.18.4, and 1.19.x before 1.19.1 allows remote attackers to inject arbitrary web script or HTML via the uselang parameter to index.php/Main_page." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[MediaWiki-announce] 20120613 MediaWiki security release 1.17.5", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-June/000116.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mediawiki.org/wiki/Release_notes/1.18" }, { "name": "82983", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/82983" }, { "name": "[MediaWiki-announce] 20120613 MediaWiki security release 1.18.4", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-June/000117.html" }, { "name": "49484", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49484" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=36938" }, { "name": "1027179", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1027179" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mediawiki.org/wiki/Release_notes/1.19" }, { "name": "mediawiki-index-uselang-xss(76311)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/76311" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mediawiki.org/wiki/Release_notes/1.17" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://gerrit.wikimedia.org/r/#/c/7979/1/includes/SkinTemplate.php" }, { "name": "[oss-security] 20120613 Re: CVE request: XSS in uselang http parameter (mediawiki)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/06/14/2" }, { "name": "[MediaWiki-announce] 20120613 MediaWiki security release 1.19.1", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-June/000118.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-2698", "datePublished": "2012-06-29T19:00:00", "dateReserved": "2012-05-14T00:00:00", "dateUpdated": "2024-08-06T19:42:31.984Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-6728
Vulnerability from cvelistv5
Published
2015-09-01 14:00
Modified
2024-08-06 07:29
Severity ?
EPSS score ?
Summary
The ApiBase::getWatchlistUser function in MediaWiki before 1.23.10, 1.24.x before 1.24.3, and 1.25.x before 1.25.2 does not perform token comparison in constant time, which allows remote attackers to guess the watchlist token and bypass CSRF protection via a timing attack.
References
▼ | URL | Tags |
---|---|---|
https://security.gentoo.org/glsa/201510-05 | vendor-advisory, x_refsource_GENTOO | |
http://www.openwall.com/lists/oss-security/2015/08/27/6 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2015/08/12/6 | mailing-list, x_refsource_MLIST | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-August/000179.html | mailing-list, x_refsource_MLIST | |
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165193.html | vendor-advisory, x_refsource_FEDORA | |
http://www.securityfocus.com/bid/76334 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:29:24.824Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201510-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201510-05" }, { "name": "[oss-security] 20150827 Re: CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/08/27/6" }, { "name": "[oss-security] 20150812 CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/08/12/6" }, { "name": "[MediaWiki-announce] 20150810 MediaWiki Security and Maintenance Releases: 1.25.2, 1.24.3, 1.23.10", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-August/000179.html" }, { "name": "FEDORA-2015-13920", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165193.html" }, { "name": "76334", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/76334" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-08-10T00:00:00", "descriptions": [ { "lang": "en", "value": "The ApiBase::getWatchlistUser function in MediaWiki before 1.23.10, 1.24.x before 1.24.3, and 1.25.x before 1.25.2 does not perform token comparison in constant time, which allows remote attackers to guess the watchlist token and bypass CSRF protection via a timing attack." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-05T21:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "GLSA-201510-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201510-05" }, { "name": "[oss-security] 20150827 Re: CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/08/27/6" }, { "name": "[oss-security] 20150812 CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/08/12/6" }, { "name": "[MediaWiki-announce] 20150810 MediaWiki Security and Maintenance Releases: 1.25.2, 1.24.3, 1.23.10", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-August/000179.html" }, { "name": "FEDORA-2015-13920", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165193.html" }, { "name": "76334", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/76334" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-6728", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The ApiBase::getWatchlistUser function in MediaWiki before 1.23.10, 1.24.x before 1.24.3, and 1.25.x before 1.25.2 does not perform token comparison in constant time, which allows remote attackers to guess the watchlist token and bypass CSRF protection via a timing attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201510-05", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201510-05" }, { "name": "[oss-security] 20150827 Re: CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/08/27/6" }, { "name": "[oss-security] 20150812 CVE Request: MediaWiki 1.25.2, 1.24.3, 1.23.10", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/08/12/6" }, { "name": "[MediaWiki-announce] 20150810 MediaWiki Security and Maintenance Releases: 1.25.2, 1.24.3, 1.23.10", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-August/000179.html" }, { "name": "FEDORA-2015-13920", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165193.html" }, { "name": "76334", "refsource": "BID", "url": "http://www.securityfocus.com/bid/76334" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-6728", "datePublished": "2015-09-01T14:00:00", "dateReserved": "2015-08-27T00:00:00", "dateUpdated": "2024-08-06T07:29:24.824Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36125
Vulnerability from cvelistv5
Published
2021-07-02 13:01
Modified
2024-08-04 00:47
Severity ?
EPSS score ?
Summary
An issue was discovered in the CentralAuth extension in MediaWiki through 1.36. The Special:GlobalRenameRequest page is vulnerable to infinite loops and denial of service attacks when a user's current username is beyond an arbitrary maximum configuration value (MaxNameChars).
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T260865 | x_refsource_MISC | |
https://gerrit.wikimedia.org/r/q/I97d8b3236b5abed8ba9a9c4d3ab5050c2e782c22 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:47:43.814Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T260865" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gerrit.wikimedia.org/r/q/I97d8b3236b5abed8ba9a9c4d3ab5050c2e782c22" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the CentralAuth extension in MediaWiki through 1.36. The Special:GlobalRenameRequest page is vulnerable to infinite loops and denial of service attacks when a user\u0027s current username is beyond an arbitrary maximum configuration value (MaxNameChars)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-02T13:01:13", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T260865" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gerrit.wikimedia.org/r/q/I97d8b3236b5abed8ba9a9c4d3ab5050c2e782c22" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-36125", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in the CentralAuth extension in MediaWiki through 1.36. The Special:GlobalRenameRequest page is vulnerable to infinite loops and denial of service attacks when a user\u0027s current username is beyond an arbitrary maximum configuration value (MaxNameChars)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T260865", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T260865" }, { "name": "https://gerrit.wikimedia.org/r/q/I97d8b3236b5abed8ba9a9c4d3ab5050c2e782c22", "refsource": "MISC", "url": "https://gerrit.wikimedia.org/r/q/I97d8b3236b5abed8ba9a9c4d3ab5050c2e782c22" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-36125", "datePublished": "2021-07-02T13:01:13", "dateReserved": "2021-07-02T00:00:00", "dateUpdated": "2024-08-04T00:47:43.814Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2005-0535
Vulnerability from cvelistv5
Published
2005-02-24 05:00
Modified
2024-08-07 21:13
Severity ?
EPSS score ?
Summary
Cross-site request forgery (CSRF) vulnerability in MediaWiki 1.3.x before 1.3.11 and 1.4 beta before 1.4 rc1 allows remote attackers to perform unauthorized actions as authenticated MediaWiki users.
References
▼ | URL | Tags |
---|---|---|
http://securitytracker.com/id?1013260 | vdb-entry, x_refsource_SECTRACK | |
http://www.gentoo.org/security/en/glsa/glsa-200502-33.xml | vendor-advisory, x_refsource_GENTOO | |
http://sourceforge.net/project/shownotes.php?release_id=307067 | x_refsource_CONFIRM | |
http://secunia.com/advisories/14360 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T21:13:54.548Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1013260", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1013260" }, { "name": "GLSA-200502-33", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200502-33.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sourceforge.net/project/shownotes.php?release_id=307067" }, { "name": "14360", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/14360" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-02-22T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability in MediaWiki 1.3.x before 1.3.11 and 1.4 beta before 1.4 rc1 allows remote attackers to perform unauthorized actions as authenticated MediaWiki users." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-03-30T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1013260", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1013260" }, { "name": "GLSA-200502-33", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200502-33.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sourceforge.net/project/shownotes.php?release_id=307067" }, { "name": "14360", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/14360" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-0535", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site request forgery (CSRF) vulnerability in MediaWiki 1.3.x before 1.3.11 and 1.4 beta before 1.4 rc1 allows remote attackers to perform unauthorized actions as authenticated MediaWiki users." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1013260", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1013260" }, { "name": "GLSA-200502-33", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200502-33.xml" }, { "name": "http://sourceforge.net/project/shownotes.php?release_id=307067", "refsource": "CONFIRM", "url": "http://sourceforge.net/project/shownotes.php?release_id=307067" }, { "name": "14360", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/14360" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-0535", "datePublished": "2005-02-24T05:00:00", "dateReserved": "2005-02-24T00:00:00", "dateUpdated": "2024-08-07T21:13:54.548Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-40600
Vulnerability from cvelistv5
Published
2024-07-06 00:00
Modified
2024-08-02 04:33
Severity ?
EPSS score ?
Summary
An issue was discovered in the Metrolook skin for MediaWiki through 1.42.1. There is stored XSS via MediaWiki:Sidebar top-level menu entries.
References
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:mediawiki:metrolook_skin:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "metrolook_skin", "vendor": "mediawiki", "versions": [ { "lessThanOrEqual": "1.42.1", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-40600", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-08T15:32:10.287145Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-08T15:33:44.032Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T04:33:11.742Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://phabricator.wikimedia.org/T361449" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the Metrolook skin for MediaWiki through 1.42.1. There is stored XSS via MediaWiki:Sidebar top-level menu entries." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-06T23:26:28.514530", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://phabricator.wikimedia.org/T361449" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-40600", "datePublished": "2024-07-06T00:00:00", "dateReserved": "2024-07-06T00:00:00", "dateUpdated": "2024-08-02T04:33:11.742Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-25827
Vulnerability from cvelistv5
Published
2020-09-27 20:43
Modified
2024-08-04 15:40
Severity ?
EPSS score ?
Summary
An issue was discovered in the OATHAuth extension in MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4. For Wikis using OATHAuth on a farm/cluster (such as via CentralAuth), rate limiting of OATH tokens is only done on a single site level. Thus, multiple requests can be made across many wikis/sites concurrently.
References
▼ | URL | Tags |
---|---|---|
https://phabricator.wikimedia.org/T251661 | x_refsource_MISC | |
https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html | x_refsource_CONFIRM | |
https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html | x_refsource_MISC | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RTTPZ7XMDS66I442OLLHXBDNP2LCBJU6/ | vendor-advisory, x_refsource_FEDORA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:40:36.980Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T251661" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html" }, { "name": "FEDORA-2020-a4802c53d9", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RTTPZ7XMDS66I442OLLHXBDNP2LCBJU6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the OATHAuth extension in MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4. For Wikis using OATHAuth on a farm/cluster (such as via CentralAuth), rate limiting of OATH tokens is only done on a single site level. Thus, multiple requests can be made across many wikis/sites concurrently." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-14T02:06:11", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T251661" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html" }, { "name": "FEDORA-2020-a4802c53d9", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RTTPZ7XMDS66I442OLLHXBDNP2LCBJU6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-25827", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in the OATHAuth extension in MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4. For Wikis using OATHAuth on a farm/cluster (such as via CentralAuth), rate limiting of OATH tokens is only done on a single site level. Thus, multiple requests can be made across many wikis/sites concurrently." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T251661", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T251661" }, { "name": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html", "refsource": "CONFIRM", "url": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html" }, { "name": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html", "refsource": "MISC", "url": "https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html" }, { "name": "FEDORA-2020-a4802c53d9", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RTTPZ7XMDS66I442OLLHXBDNP2LCBJU6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-25827", "datePublished": "2020-09-27T20:43:20", "dateReserved": "2020-09-23T00:00:00", "dateUpdated": "2024-08-04T15:40:36.980Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-4301
Vulnerability from cvelistv5
Published
2013-10-27 00:00
Modified
2024-08-06 16:38
Severity ?
EPSS score ?
Summary
includes/resourceloader/ResourceLoaderContext.php in MediaWiki 1.19.x before 1.19.8, 1.20.x before 1.20.7, and 1.21.x before 1.21.2 allows remote attackers to obtain sensitive information via a "<" (open angle bracket) character in the lang parameter to w/load.php, which reveals the installation path in an error message.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/86895 | vdb-entry, x_refsource_XF | |
http://seclists.org/oss-sec/2013/q3/553 | mailing-list, x_refsource_MLIST | |
http://secunia.com/advisories/54715 | third-party-advisory, x_refsource_SECUNIA | |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-September/000133.html | mailing-list, x_refsource_MLIST | |
http://osvdb.org/96913 | vdb-entry, x_refsource_OSVDB | |
https://bugzilla.wikimedia.org/show_bug.cgi?id=46332 | x_refsource_CONFIRM | |
https://www.mediawiki.org/wiki/Release_notes/1.19 | x_refsource_CONFIRM | |
https://www.mediawiki.org/wiki/Release_notes/1.20 | x_refsource_CONFIRM | |
https://www.mediawiki.org/wiki/Release_notes/1.21 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:38:01.927Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "mediawiki-cve20134301-info-disclosure(86895)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86895" }, { "name": "[oss-security] 20130904 Re: CVE request: MediaWiki Security Release: 1.21.2, 1.20.7 and 1.19.8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2013/q3/553" }, { "name": "54715", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54715" }, { "name": "[MediaWiki-announce] 20130903 MediaWiki Security Release: 1.21.2, 1.20.7 and 1.19.8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-September/000133.html" }, { "name": "96913", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/96913" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=46332" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mediawiki.org/wiki/Release_notes/1.19" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mediawiki.org/wiki/Release_notes/1.20" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mediawiki.org/wiki/Release_notes/1.21" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-09-03T00:00:00", "descriptions": [ { "lang": "en", "value": "includes/resourceloader/ResourceLoaderContext.php in MediaWiki 1.19.x before 1.19.8, 1.20.x before 1.20.7, and 1.21.x before 1.21.2 allows remote attackers to obtain sensitive information via a \"\u003c\" (open angle bracket) character in the lang parameter to w/load.php, which reveals the installation path in an error message." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "mediawiki-cve20134301-info-disclosure(86895)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86895" }, { "name": "[oss-security] 20130904 Re: CVE request: MediaWiki Security Release: 1.21.2, 1.20.7 and 1.19.8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2013/q3/553" }, { "name": "54715", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54715" }, { "name": "[MediaWiki-announce] 20130903 MediaWiki Security Release: 1.21.2, 1.20.7 and 1.19.8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-September/000133.html" }, { "name": "96913", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/96913" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=46332" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mediawiki.org/wiki/Release_notes/1.19" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mediawiki.org/wiki/Release_notes/1.20" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mediawiki.org/wiki/Release_notes/1.21" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-4301", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "includes/resourceloader/ResourceLoaderContext.php in MediaWiki 1.19.x before 1.19.8, 1.20.x before 1.20.7, and 1.21.x before 1.21.2 allows remote attackers to obtain sensitive information via a \"\u003c\" (open angle bracket) character in the lang parameter to w/load.php, which reveals the installation path in an error message." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "mediawiki-cve20134301-info-disclosure(86895)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86895" }, { "name": "[oss-security] 20130904 Re: CVE request: MediaWiki Security Release: 1.21.2, 1.20.7 and 1.19.8", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2013/q3/553" }, { "name": "54715", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54715" }, { "name": "[MediaWiki-announce] 20130903 MediaWiki Security Release: 1.21.2, 1.20.7 and 1.19.8", "refsource": "MLIST", "url": "http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-September/000133.html" }, { "name": "96913", "refsource": "OSVDB", "url": "http://osvdb.org/96913" }, { "name": "https://bugzilla.wikimedia.org/show_bug.cgi?id=46332", "refsource": "CONFIRM", "url": "https://bugzilla.wikimedia.org/show_bug.cgi?id=46332" }, { "name": "https://www.mediawiki.org/wiki/Release_notes/1.19", "refsource": "CONFIRM", "url": "https://www.mediawiki.org/wiki/Release_notes/1.19" }, { "name": "https://www.mediawiki.org/wiki/Release_notes/1.20", "refsource": "CONFIRM", "url": "https://www.mediawiki.org/wiki/Release_notes/1.20" }, { "name": "https://www.mediawiki.org/wiki/Release_notes/1.21", "refsource": "CONFIRM", "url": "https://www.mediawiki.org/wiki/Release_notes/1.21" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-4301", "datePublished": "2013-10-27T00:00:00", "dateReserved": "2013-06-12T00:00:00", "dateUpdated": "2024-08-06T16:38:01.927Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-12473
Vulnerability from cvelistv5
Published
2019-07-10 15:43
Modified
2024-08-04 23:24
Severity ?
EPSS score ?
Summary
Wikimedia MediaWiki 1.27.0 through 1.32.1 might allow DoS. Passing invalid titles to the API could cause a DoS by querying the entire watchlist table. Fixed in 1.32.2, 1.31.2, 1.30.2 and 1.27.6.
References
▼ | URL | Tags |
---|---|---|
https://www.debian.org/security/2019/dsa-4460 | vendor-advisory, x_refsource_DEBIAN | |
https://seclists.org/bugtraq/2019/Jun/12 | mailing-list, x_refsource_BUGTRAQ | |
https://phabricator.wikimedia.org/T204729 | x_refsource_MISC | |
https://lists.wikimedia.org/pipermail/wikitech-l/2019-June/092152.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:24:37.832Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "DSA-4460", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2019/dsa-4460" }, { "name": "20190612 [SECURITY] [DSA 4460-1] mediawiki security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Jun/12" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T204729" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2019-June/092152.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Wikimedia MediaWiki 1.27.0 through 1.32.1 might allow DoS. Passing invalid titles to the API could cause a DoS by querying the entire watchlist table. Fixed in 1.32.2, 1.31.2, 1.30.2 and 1.27.6." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-07-10T15:44:04", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "DSA-4460", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2019/dsa-4460" }, { "name": "20190612 [SECURITY] [DSA 4460-1] mediawiki security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Jun/12" }, { "tags": [ "x_refsource_MISC" ], "url": "https://phabricator.wikimedia.org/T204729" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2019-June/092152.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-12473", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Wikimedia MediaWiki 1.27.0 through 1.32.1 might allow DoS. Passing invalid titles to the API could cause a DoS by querying the entire watchlist table. Fixed in 1.32.2, 1.31.2, 1.30.2 and 1.27.6." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "DSA-4460", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2019/dsa-4460" }, { "name": "20190612 [SECURITY] [DSA 4460-1] mediawiki security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Jun/12" }, { "name": "https://phabricator.wikimedia.org/T204729", "refsource": "MISC", "url": "https://phabricator.wikimedia.org/T204729" }, { "name": "https://lists.wikimedia.org/pipermail/wikitech-l/2019-June/092152.html", "refsource": "CONFIRM", "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2019-June/092152.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-12473", "datePublished": "2019-07-10T15:43:45", "dateReserved": "2019-05-30T00:00:00", "dateUpdated": "2024-08-04T23:24:37.832Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }