First published: Mon Sep 25 2023(Updated: )
Mediawiki v1.40.0 does not validate namespaces used in XML files. Therefore, if the instance administrator allows XML file uploads, a remote attacker with a low-privileged user account can use this exploit to become an administrator by sending a malicious link to the instance administrator.
Credit: help@fluidattacks.com help@fluidattacks.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/mediawiki | <=1:1.31.16-1+deb10u2<=1:1.35.11-1~deb11u1 | 1:1.31.16-1+deb10u7 1:1.35.13-1~deb11u1 1:1.39.5-1~deb12u1 1:1.39.5-1 |
MediaWiki MediaWiki | =1.40.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-3550.
CVE-2023-3550 has a severity level of critical (9).
CVE-2023-3550 allows a remote attacker with a low-privileged user account to become an administrator by sending a malicious link to the instance administrator.
To fix CVE-2023-3550 in Mediawiki v1.40.0, you should apply the latest security patch provided by Mediawiki.
You can find more information about CVE-2023-3550 in the following references: - Fluid Attacks Advisory: [https://fluidattacks.com/advisories/blondie/](https://fluidattacks.com/advisories/blondie/) - Mediawiki Documentation: [https://www.mediawiki.org/wiki/MediaWiki/](https://www.mediawiki.org/wiki/MediaWiki/)