XSS exists in the MobileFrontend extension for MediaWiki before 1.34.4 because section.line is mishandled during regex section line replacement from PageGateway. Using crafted HTML, an attacker can elicit an XSS attack via jQuery's parseHTML method, which can cause image callbacks to fire even without the element being appended to the DOM.
References
Link | Resource |
---|---|
https://gerrit.wikimedia.org/r/q/I42e079bc875d17b336ab015f3678eaedc26e10ea | Vendor Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RTTPZ7XMDS66I442OLLHXBDNP2LCBJU6/ | |
https://phabricator.wikimedia.org/T262213 | Exploit Issue Tracking Patch Vendor Advisory |
https://gerrit.wikimedia.org/r/q/I42e079bc875d17b336ab015f3678eaedc26e10ea | Vendor Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RTTPZ7XMDS66I442OLLHXBDNP2LCBJU6/ | |
https://phabricator.wikimedia.org/T262213 | Exploit Issue Tracking Patch Vendor Advisory |
Configurations
History
21 Nov 2024, 05:19
Type | Values Removed | Values Added |
---|---|---|
References | () https://gerrit.wikimedia.org/r/q/I42e079bc875d17b336ab015f3678eaedc26e10ea - Vendor Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RTTPZ7XMDS66I442OLLHXBDNP2LCBJU6/ - | |
References | () https://phabricator.wikimedia.org/T262213 - Exploit, Issue Tracking, Patch, Vendor Advisory |
07 Nov 2023, 03:20
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2020-09-27 21:15
Updated : 2024-11-21 05:19
NVD link : CVE-2020-26120
Mitre link : CVE-2020-26120
CVE.ORG link : CVE-2020-26120
JSON object : View
Products Affected
mediawiki
- mediawiki
fedoraproject
- fedora
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')