First published: Fri Aug 22 2014(Updated: )
Cross-site scripting (XSS) vulnerability in mediawiki.page.image.pagination.js in MediaWiki 1.22.x before 1.22.9 and 1.23.x before 1.23.2 allows remote attackers to inject arbitrary web script or HTML via vectors involving the multipageimagenavbox class in conjunction with an action=raw value.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MediaWiki | =1.22.0 | |
MediaWiki | =1.22.1 | |
MediaWiki | =1.22.2 | |
MediaWiki | =1.22.3 | |
MediaWiki | =1.22.4 | |
MediaWiki | =1.22.5 | |
MediaWiki | =1.22.6 | |
MediaWiki | =1.22.7 | |
MediaWiki | =1.22.8 | |
MediaWiki | =1.23.0 | |
MediaWiki | =1.23.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-5242 is classified as a high severity vulnerability due to its potential to allow remote attackers to execute arbitrary scripts.
To fix CVE-2014-5242, upgrade your MediaWiki installation to version 1.22.9 or 1.23.2 or later.
CVE-2014-5242 affects MediaWiki versions 1.22.0 through 1.22.8 and 1.23.0 through 1.23.1.
CVE-2014-5242 is a cross-site scripting (XSS) vulnerability.
Yes, CVE-2014-5242 can be exploited remotely by attackers through specific vectors.