Vulnerability Name: | CVE-2020-26120 (CCN-188918) | ||||||||||||
Assigned: | 2020-09-24 | ||||||||||||
Published: | 2020-09-24 | ||||||||||||
Updated: | 2022-01-06 | ||||||||||||
Summary: | XSS exists in the MobileFrontend extension for MediaWiki before 1.34.4 because section.line is mishandled during regex section line replacement from PageGateway. Using crafted HTML, an attacker can elicit an XSS attack via jQuery's parseHTML method, which can cause image callbacks to fire even without the element being appended to the DOM. | ||||||||||||
CVSS v3 Severity: | 6.1 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) 5.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:H/RL:O/RC:C)
5.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:H/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
| ||||||||||||
Vulnerability Type: | CWE-79 | ||||||||||||
Vulnerability Consequences: | Cross-Site Scripting | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-26120 Source: XF Type: UNKNOWN mediawiki-cve202026120-xss(188918) Source: MISC Type: Vendor Advisory https://gerrit.wikimedia.org/r/q/I42e079bc875d17b336ab015f3678eaedc26e10ea Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2020-a4802c53d9 Source: CCN Type: MediaWiki Mailing List, Thu Sep 24 15:05:38 UTC 2020 [MediaWiki-l] Security and maintenance release: 1.31.9 / 1.34.3 Source: MISC Type: Exploit, Issue Tracking, Patch, Vendor Advisory https://phabricator.wikimedia.org/T262213 Source: CCN Type: MediaWiki Web site MediaWiki Source: CCN Type: WhiteSource Vulnerability Database CVE-2020-26120 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
BACK |