CVE-2022-4561

A vulnerability classified as problematic has been found in SemanticDrilldown Extension. Affected is the function printFilterLine of the file includes/specials/SDBrowseDataPage.php of the component GET Parameter Handler. The manipulation of the argument value leads to cross site scripting. It is possible to launch the attack remotely. The name of the patch is 6e18cf740a4548166c1d95f6d3a28541d298a3aa. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-215964.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mediawiki:semantic_drilldown:*:*:*:*:*:mediawiki:*:*

History

21 Nov 2024, 07:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 6.1
v2 : unknown
v3 : 3.5
References () https://github.com/wikimedia/mediawiki-extensions-SemanticDrilldown/commit/6e18cf740a4548166c1d95f6d3a28541d298a3aa - Patch, Third Party Advisory () https://github.com/wikimedia/mediawiki-extensions-SemanticDrilldown/commit/6e18cf740a4548166c1d95f6d3a28541d298a3aa - Patch, Third Party Advisory
References () https://vuldb.com/?id.215964 - Permissions Required, Third Party Advisory () https://vuldb.com/?id.215964 - Permissions Required, Third Party Advisory

07 Nov 2023, 03:58

Type Values Removed Values Added
CWE CWE-74
CWE-79

Information

Published : 2022-12-16 17:15

Updated : 2024-11-21 07:35


NVD link : CVE-2022-4561

Mitre link : CVE-2022-4561

CVE.ORG link : CVE-2022-4561


JSON object : View

Products Affected

mediawiki

  • semantic_drilldown
CWE
CWE-707

Improper Neutralization