In MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4, XSS related to jQuery can occur. The attacker creates a message with [javascript:payload xss] and turns it into a jQuery object with mw.message().parse(). The expected result is that the jQuery object does not contain an <a> tag (or it does not have a href attribute, or it's empty, etc.). The actual result is that the object contains an <a href ="javascript... that executes when clicked.
{
"unresolved_ranges": [
{
"extracted_events": [
{
"last_affected": "33"
}
],
"cpes": [
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*"
],
"source": "CPE_FIELD",
"vendor_product": "fedoraproject:fedora"
}
]
}{
"extracted_events": [
{
"introduced": "0"
},
{
"fixed": "1.31.10"
},
{
"introduced": "1.32.0"
},
{
"fixed": "1.34.4"
}
],
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*"
}