ghsa-4x6x-8rm8-c37j
Vulnerability from github
Summary
There are several sources of arbitrary, unescaped user input being used to construct HTML, which allows any user that can edit pages or otherwise render wikitext to XSS other users.
Edit: Only the first XSS can be reproduced in production.
Details
✅ Verified and patched in f229cab099c69006e25d4bad3579954e481dc566
https://github.com/StarCitizenTools/mediawiki-extensions-TabberNeue/blob/2526daa9f8cfdd616c861c8439755cb74a6c8c6e/includes/TabberTransclude.php#L154 This doesn't escape the user-supplied page name when outputting, so an XSS payload as the page name can be used here.
This was caused by d8c3db4e5935476e496d979fb01f775d3d3282e6.
❌ Invalid as MediaWiki parser sanitizes dangerous HTML
https://github.com/StarCitizenTools/mediawiki-extensions-TabberNeue/blob/2526daa9f8cfdd616c861c8439755cb74a6c8c6e/includes/Tabber.php#L160
The documentation for Parser::recursiveTagParse()
states that it returns unsafe HTML, and the $content
being supplied is from user input.
This was caused by 95351812613e04717f3ad7844cfcc67e4ede4d11.
❌ Invalid as TabberParsoid is not being used
https://github.com/StarCitizenTools/mediawiki-extensions-TabberNeue/blob/2526daa9f8cfdd616c861c8439755cb74a6c8c6e/includes/TabberParsoid.php#L96 This uses unescaped user input as the attribute of an element, thus allowing the user to break out of the attribute or element and injecting arbitrary attributes to the element, or inserting new ones (such as a script tag).
This was caused by 8278e665480f08da635aee383c6b5caaeca26ba3.
PoC
For the first XSS, render the following wikitext (whether it be through saving it to a page and viewing it, or via Special:ExpandTemplates): ```wikitext
alert(1)| hehe
```
For the second XSS, I have given up attempting to reproduce it after over twenty minutes of "surfing through the internals of the MediaWiki parser fishing for an XSS out of this giant contraption as I bring myself deeper and deeper into the cogs of the machine that no one knows how to maintain or fully operate ever since its conception".
For the third XSS, this is unreachable as the class is never used, though it should be fixed anyway (or the file removed).
Impact
Any user with the ability to cause another user to render wikitext (such as viewing a page that the user can edit, or an attacker tricking the victim to click on a link to Special:ExpandTemplates with the malicious wikitext in the wpInput
parameter) can XSS said user.
{ "affected": [ { "package": { "ecosystem": "Packagist", "name": "starcitizentools/tabber-neue" }, "ranges": [ { "events": [ { "introduced": "1.9.1" }, { "fixed": "2.7.2" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2025-21612" ], "database_specific": { "cwe_ids": [ "CWE-79" ], "github_reviewed": true, "github_reviewed_at": "2025-01-06T15:47:49Z", "nvd_published_at": "2025-01-06T16:15:31Z", "severity": "HIGH" }, "details": "### Summary\nThere are several sources of arbitrary, unescaped user input being used to construct HTML, which allows any user that can edit pages or otherwise render wikitext to XSS other users.\n\n\u003e Edit: Only the first XSS can be reproduced in production.\n\n### Details\n\n\u003e \u2705 Verified and patched in f229cab099c69006e25d4bad3579954e481dc566\n\nhttps://github.com/StarCitizenTools/mediawiki-extensions-TabberNeue/blob/2526daa9f8cfdd616c861c8439755cb74a6c8c6e/includes/TabberTransclude.php#L154\nThis doesn\u0027t escape the user-supplied page name when outputting, so an XSS payload as the page name can be used here.\n\nThis was caused by d8c3db4e5935476e496d979fb01f775d3d3282e6.\n\n----\n\n\u003e \u274c Invalid as MediaWiki parser sanitizes dangerous HTML\n\nhttps://github.com/StarCitizenTools/mediawiki-extensions-TabberNeue/blob/2526daa9f8cfdd616c861c8439755cb74a6c8c6e/includes/Tabber.php#L160\nThe documentation for [`Parser::recursiveTagParse()`](https://doc.wikimedia.org/mediawiki-core/REL1_42/php/classMediaWiki_1_1Parser_1_1Parser.html#ae450036ec9abb417f142bfdaede02783) states that it returns unsafe HTML, and the `$content` being supplied is from user input.\n\nThis was caused by 95351812613e04717f3ad7844cfcc67e4ede4d11.\n\n----\n\n\u003e \u274c Invalid as TabberParsoid is not being used\n\nhttps://github.com/StarCitizenTools/mediawiki-extensions-TabberNeue/blob/2526daa9f8cfdd616c861c8439755cb74a6c8c6e/includes/TabberParsoid.php#L96\nThis uses unescaped user input as the attribute of an element, thus allowing the user to break out of the attribute or element and injecting arbitrary attributes to the element, or inserting new ones (such as a script tag).\n\nThis was caused by 8278e665480f08da635aee383c6b5caaeca26ba3.\n\n### PoC\nFor the first XSS, render the following wikitext (whether it be through saving it to a page and viewing it, or via Special:ExpandTemplates):\n```wikitext\n\u003ctabbertransclude\u003e\n\u003cscript\u003ealert(1)\u003c/script\u003e | hehe\n\u003c/tabbertransclude\u003e\n```\n\n\nFor the second XSS, I have given up attempting to reproduce it after over twenty minutes of \"surfing through the internals of the MediaWiki parser fishing for an XSS out of this giant contraption as I bring myself deeper and deeper into the cogs of the machine that no one knows how to maintain or fully operate ever since its conception\".\n\nFor the third XSS, this is unreachable as the class is never used, though it should be fixed anyway (or the file removed).\n\n### Impact\nAny user with the ability to cause another user to render wikitext (such as viewing a page that the user can edit, or an attacker tricking the victim to click on a link to Special:ExpandTemplates with the malicious wikitext in the `wpInput` parameter) can XSS said user.\n", "id": "GHSA-4x6x-8rm8-c37j", "modified": "2025-01-06T18:42:30Z", "published": "2025-01-06T15:47:49Z", "references": [ { "type": "WEB", "url": "https://github.com/StarCitizenTools/mediawiki-extensions-TabberNeue/security/advisories/GHSA-4x6x-8rm8-c37j" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21612" }, { "type": "WEB", "url": "https://github.com/StarCitizenTools/mediawiki-extensions-TabberNeue/commit/d8c3db4e5935476e496d979fb01f775d3d3282e6" }, { "type": "WEB", "url": "https://github.com/StarCitizenTools/mediawiki-extensions-TabberNeue/commit/f229cab099c69006e25d4bad3579954e481dc566" }, { "type": "PACKAGE", "url": "https://github.com/StarCitizenTools/mediawiki-extensions-TabberNeue" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", "type": "CVSS_V3" } ], "summary": "Extension:TabberNeue vulnerable to Cross-site Scripting" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.