XSS exists in the MobileFrontend extension for MediaWiki before 1.34.4 because section.line is mishandled during regex section line replacement from PageGateway. Using crafted HTML, an attacker can elicit an XSS attack via jQuery's parseHTML method, which can cause image callbacks to fire even without the element being appended to the DOM.
References
Link | Resource |
---|---|
https://gerrit.wikimedia.org/r/q/I42e079bc875d17b336ab015f3678eaedc26e10ea | Vendor Advisory |
https://phabricator.wikimedia.org/T262213 | Exploit Issue Tracking Patch Vendor Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RTTPZ7XMDS66I442OLLHXBDNP2LCBJU6/ | Mailing List Third Party Advisory |
Information
Published : 2020-09-27 14:15
Updated : 2022-01-06 06:18
NVD link : CVE-2020-26120
Mitre link : CVE-2020-26120
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
fedoraproject
- fedora
mediawiki
- mediawiki