The ScratchSig extension for MediaWiki before version 1.0.1 allows stored Cross-Site Scripting. Using <script> tag inside <scratchsig> tag, attackers with edit permission can execute scripts on visitors' browser. With MediaWiki JavaScript API, this can potentially lead to privilege escalation and/or account takeover. This has been patched in release 1.0.1. This has already been deployed to all Scratch Wikis. No workarounds exist other than disabling the extension completely.
References
Link | Resource |
---|---|
https://github.com/InternationalScratchWiki/wiki-scratchsig/commit/4160a39a20eebeb63a59eb7597a91b961eca6388 | Patch Third Party Advisory |
https://github.com/InternationalScratchWiki/wiki-scratchsig/security/advisories/GHSA-gp9v-pg9f-vmp6 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2020-09-15 18:15
Updated : 2024-02-28 17:47
NVD link : CVE-2020-15179
Mitre link : CVE-2020-15179
CVE.ORG link : CVE-2020-15179
JSON object : View
Products Affected
scratch-wiki
- scratchsig
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')