First published: Wed Dec 11 2019(Updated: )
includes/libs/IEUrlExtension.php in the MediaWiki API in MediaWiki 1.19.x before 1.19.8, 1.20.x before 1.20.7, and 1.21.x before 1.21.2 does not properly detect extensions when there are an even number of "." (period) characters in a string, which allows remote attackers to conduct cross-site scripting (XSS) attacks via the siprop parameter in a query action to wiki/api.php.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
MediaWiki | >=1.19.0<1.19.8 | |
MediaWiki | >=1.20.0<1.20.7 | |
MediaWiki | >=1.21.0<1.21.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4303 is rated as a moderate severity vulnerability due to its potential for cross-site scripting attacks.
To fix CVE-2013-4303, upgrade MediaWiki to version 1.19.8, 1.20.7, or 1.21.2 or later.
CVE-2013-4303 affects MediaWiki versions prior to 1.19.8, 1.20.7, and 1.21.2 including 1.19.x, 1.20.x, and 1.21.x branch releases.
CVE-2013-4303 facilitates cross-site scripting (XSS) attacks, allowing attackers to execute scripts in the context of the user's browser.
CVE-2013-4303 specifically affects the includes/libs/IEUrlExtension.php component of MediaWiki's API.