Cross-site scripting (XSS) vulnerability in MediaWiki before 1.16.5, when Internet Explorer 6 or earlier is used, allows remote attackers to inject arbitrary web script or HTML via an uploaded file accessed with a dangerous extension such as .shtml at the end of the query string, in conjunction with a modified URI path that has a %2E sequence in place of the . (dot) character. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-1578 and CVE-2011-1587.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060496.html | vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=702512 | patch |
http://secunia.com/advisories/44684 | third party advisory |
http://www.securityfocus.com/bid/47722 | vdb entry |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-May/000098.html | mailing list patch |
https://bugzilla.wikimedia.org/show_bug.cgi?id=28534 | exploit |
http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060435.html | vendor advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060507.html | vendor advisory |