Cross-site scripting (XSS) vulnerability in MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2, when using HHVM, allows remote attackers to inject arbitrary web script or HTML via an invalid parameter in a wddx format request to api.php, which is not properly handled in an error message, related to unsafe calls to wddx_serialize_value.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:28
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2015/04/01/1 - | |
References | () http://www.openwall.com/lists/oss-security/2015/04/07/3 - | |
References | () http://www.securityfocus.com/bid/73477 - | |
References | () https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html - Patch, Vendor Advisory | |
References | () https://phabricator.wikimedia.org/T85851 - Exploit | |
References | () https://security.gentoo.org/glsa/201510-05 - |
Information
Published : 2015-04-13 14:59
Updated : 2024-11-21 02:28
NVD link : CVE-2015-2941
Mitre link : CVE-2015-2941
CVE.ORG link : CVE-2015-2941
JSON object : View
Products Affected
mediawiki
- mediawiki
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')