The RandomGameUnit extension for MediaWiki through 1.35 was not properly escaping various title-related data. When certain varieties of games were created within MediaWiki, their names or titles could be manipulated to generate stored XSS within the RandomGameUnit extension.
References
Link | Resource |
---|---|
https://gerrit.wikimedia.org/r/q/I497d2076038f75c9eb77e0e250f2af56f5bd2bfc | Patch Vendor Advisory |
https://phabricator.wikimedia.org/T266400 | Exploit Vendor Advisory |
https://gerrit.wikimedia.org/r/q/I497d2076038f75c9eb77e0e250f2af56f5bd2bfc | Patch Vendor Advisory |
https://phabricator.wikimedia.org/T266400 | Exploit Vendor Advisory |
Configurations
History
21 Nov 2024, 05:22
Type | Values Removed | Values Added |
---|---|---|
References | () https://gerrit.wikimedia.org/r/q/I497d2076038f75c9eb77e0e250f2af56f5bd2bfc - Patch, Vendor Advisory | |
References | () https://phabricator.wikimedia.org/T266400 - Exploit, Vendor Advisory |
Information
Published : 2020-10-28 03:15
Updated : 2024-11-21 05:22
NVD link : CVE-2020-27957
Mitre link : CVE-2020-27957
CVE.ORG link : CVE-2020-27957
JSON object : View
Products Affected
mediawiki
- mediawiki
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')