Rapid7 Vulnerability & Exploit Database

MediaWiki: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') (CVE-2020-10960)

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

MediaWiki: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') (CVE-2020-10960)

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:P/A:N)
Published
04/03/2020
Created
04/09/2020
Added
04/08/2020
Modified
08/05/2021

Description

In MediaWiki before 1.34.1, users can add various Cascading Style Sheets (CSS) classes (which can affect what content is shown or hidden in the user interface) to arbitrary DOM nodes via HTML content within a MediaWiki page. This occurs because jquery.makeCollapsible allows applying an event handler to any Cascading Style Sheets (CSS) selector. There is no known way to exploit this for cross-site scripting (XSS).

Solution(s)

  • mediawiki-upgrade-1_34_1

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;