Cross-site scripting (XSS) vulnerability in MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2, when using HHVM, allows remote attackers to inject arbitrary web script or HTML via an invalid parameter in a wddx format request to api.php, which is not properly handled in an error message, related to unsafe calls to wddx_serialize_value.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://security.gentoo.org/glsa/201510-05 | vendor advisory |
https://phabricator.wikimedia.org/T85851 | exploit |
http://www.securityfocus.com/bid/73477 | vdb entry |
http://www.openwall.com/lists/oss-security/2015/04/07/3 | mailing list |
http://www.openwall.com/lists/oss-security/2015/04/01/1 | mailing list |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html | mailing list patch vendor advisory |