Improper Encoding or Escaping of Output Affecting mediawiki package, versions <1:1.31.12-1~deb10u1
Snyk CVSS
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN10-MEDIAWIKI-1052802
- published 18 Dec 2020
- disclosed 18 Dec 2020
Introduced: 18 Dec 2020
CVE-2020-35475 Open this link in a new tabHow to fix?
Upgrade Debian:10
mediawiki
to version 1:1.31.12-1~deb10u1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream mediawiki
package and not the mediawiki
package as distributed by Debian
.
See How to fix?
for Debian:10
relevant fixed versions and status.
In MediaWiki before 1.35.1, the messages userrights-expiry-current and userrights-expiry-none can contain raw HTML. XSS can happen when a user visits Special:UserRights but does not have rights to change all userrights, and the table on the left side has unchangeable groups in it. (The right column with the changeable groups is not affected and is escaped correctly.)
References
- https://security-tracker.debian.org/tracker/CVE-2020-35475
- https://www.debian.org/security/2020/dsa-4816
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STT5Z4A3BCXVH3WIPICWU2FP4IPIMUPC/
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2020-December/000268.html
- https://phabricator.wikimedia.org/T268917
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STT5Z4A3BCXVH3WIPICWU2FP4IPIMUPC/