First published: Sun Oct 21 2018(Updated: )
Loading JS from user space where the username is not a registered account is dangerous and should be banned
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/mediawiki/core | >=1.27.0<1.27.6>=1.30.0<1.30.2>=1.31.0<1.31.2 | |
debian/mediawiki | 1:1.31.16-1+deb10u2 1:1.31.16-1+deb10u6 1:1.35.11-1~deb11u1 1:1.35.13-1~deb11u1 1:1.39.4-1~deb12u1 1:1.39.5-1~deb12u1 1:1.39.5-1 | |
composer/mediawiki/core | >=1.31.0<1.31.2 | 1.31.2 |
composer/mediawiki/core | >=1.30.0<1.30.2 | 1.30.2 |
composer/mediawiki/core | >=1.27.0<1.27.6 | 1.27.6 |
Wikimedia MediaWiki | >=1.30.0<1.30.2 | |
Wikimedia MediaWiki | >=1.31.0<1.31.2 | |
Wikimedia MediaWiki | >=1.32.0<1.32.2 | |
Debian GNU/Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-12471 is classified as a medium severity vulnerability due to its potential for cross-site scripting (XSS) attacks.
To fix CVE-2019-12471, upgrade to MediaWiki versions 1.31.16 or later, 1.35.11 or later, or 1.39.4 or later.
CVE-2019-12471 affects MediaWiki versions 1.30.0 through 1.32.1 and some earlier versions.
CVE-2019-12471 allows an attacker to execute arbitrary JavaScript in the context of other users, leading to potential data theft or session hijacking.
Yes, CVE-2019-12471 highlights a failure in user input validation, specifically when loading JavaScript from unregistered user accounts.