UBUNTU-CVE-2020-25828

Source
https://ubuntu.com/security/CVE-2020-25828
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-25828.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2020-25828
Related
Published
2020-09-27T21:15:00Z
Modified
2024-10-15T14:07:39Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

An issue was discovered in MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4. The non-jqueryMsg version of mw.message().parse() doesn't escape HTML. This affects both message contents (which are generally safe) and the parameters (which can be based on user input). (When jqueryMsg is loaded, it correctly accepts only whitelisted tags in message contents, and escapes all parameters. Situations with an unloaded jqueryMsg are rare in practice, but can for example occur for Special:SpecialPages on a wiki with no extensions installed.)

References

Affected packages

Ubuntu:Pro:18.04:LTS / mediawiki

Package

Name
mediawiki
Purl
pkg:deb/ubuntu/mediawiki?arch=src?distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:1.*

1:1.27.3-1
1:1.27.4-1
1:1.27.4-2
1:1.27.4-3

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:20.04:LTS / mediawiki

Package

Name
mediawiki
Purl
pkg:deb/ubuntu/mediawiki?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:1.*

1:1.31.2-1ubuntu1
1:1.31.5-1
1:1.31.5-1ubuntu1
1:1.31.5-2
1:1.31.5-3
1:1.31.5-3ubuntu1
1:1.31.6-1
1:1.31.7-1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}