Mediawiki v1.40.0 does not validate namespaces used in XML files. Therefore, if the instance administrator allows XML file uploads, a remote attacker with a low-privileged user account can use this exploit to become an administrator by sending a malicious link to the instance administrator.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://fluidattacks.com/advisories/blondie/ | third party advisory exploit |
https://www.mediawiki.org/wiki/MediaWiki/ | product |
https://www.debian.org/security/2023/dsa-5520 | third party advisory |
https://lists.debian.org/debian-lts-announce/2023/11/msg00027.html | third party advisory mailing list |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FU2FGUXXK6TMV6R52VRECLC6XCSQQISY/ |