First published: Tue Jan 17 2023(Updated: )
A vulnerability, which was classified as problematic, was found in Wikisource Category Browser. This affects an unknown part of the file index.php. The manipulation of the argument lang leads to cross site scripting. It is possible to initiate the attack remotely. The patch is named 764f4e8ce3f9242637df77530c70ae8a2ec4b6a1. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218415.
Credit: cna@vuldb.com cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mediawiki Wikisource Category Browser | <2015-07-10 | |
<2015-07-10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-10058 is a vulnerability found in Wikisource Category Browser that allows for remote cross-site scripting attacks.
CVE-2015-10058 has a severity level of 6.1, which is classified as medium.
CVE-2015-10058 affects an unknown part of the file index.php in Wikisource Category Browser, allowing for the manipulation of the 'lang' argument and enabling cross-site scripting attacks.
Yes, there is a patch available for CVE-2015-10058. The patch can be found at the following link: https://github.com/wikisource/ws-cat-browser/commit/764f4e8ce3f9242637df77530c70ae8a2ec4b6a1
The Common Weakness Enumeration (CWE) associated with CVE-2015-10058 is CWE-79, which refers to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')