Multiple cross-site scripting (XSS) vulnerabilities in the SemanticForms extension for MediaWiki allow remote attackers to inject arbitrary web script or HTML via a (1) section_*, (2) template_*, (3) label_*, or (4) new_template parameter to Special:CreateForm or (5) target or (6) alt_form parameter to Special:FormEdit.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://security.gentoo.org/glsa/201510-05 | vendor advisory |
http://www.openwall.com/lists/oss-security/2015/08/27/6 | mailing list |
http://www.openwall.com/lists/oss-security/2015/08/12/6 | mailing list |
https://phabricator.wikimedia.org/T103391 | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-August/000179.html | mailing list vendor advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165193.html | vendor advisory |
http://www.securityfocus.com/bid/76334 | vdb entry |