First published: Thu Sep 24 2020(Updated: )
In MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4, XSS related to jQuery can occur. The attacker creates a message with [javascript:payload xss] and turns it into a jQuery object with mw.message().parse(). The expected result is that the jQuery object does not contain an <a> tag (or it does not have a href attribute, or it's empty, etc.). The actual result is that the object contains an <a href ="javascript... that executes when clicked.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/mediawiki/core | >=1.31.0<1.31.9>=1.34.0<1.34.3>=1.34.99<1.35.0 | |
debian/mediawiki | 1:1.31.16-1+deb10u2 1:1.31.16-1+deb10u6 1:1.35.11-1~deb11u1 1:1.35.13-1~deb11u1 1:1.39.4-1~deb12u1 1:1.39.5-1~deb12u1 1:1.39.5-1 | |
MediaWiki MediaWiki | <1.31.10 | |
MediaWiki MediaWiki | >=1.32.0<1.34.4 | |
Fedoraproject Fedora | =33 | |
composer/mediawiki/core | >=1.35.0-rc.0<1.35.0 | 1.35.0 |
composer/mediawiki/core | >=1.32.0<1.34.3 | 1.34.3 |
composer/mediawiki/core | >=1.31.0<1.31.9 | 1.31.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.