Vulnerability Name: | CVE-2020-35625 (CCN-193636) | ||||||||||||
Assigned: | 2020-12-08 | ||||||||||||
Published: | 2020-12-08 | ||||||||||||
Updated: | 2021-07-21 | ||||||||||||
Summary: | An issue was discovered in the Widgets extension for MediaWiki through 1.35.1. Any user with the ability to edit pages within the Widgets namespace could call any static function within any class (defined within PHP or MediaWiki) via a crafted HTML comment, related to a Smarty template. For example, a person in the Widget Editors group could use \MediaWiki\Shell\Shell::command within a comment. | ||||||||||||
CVSS v3 Severity: | 8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) 7.7 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
8.5 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 6.5 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Type: | CWE-732 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-35625 Source: XF Type: UNKNOWN mediawiki-cve202035625-code-exec(193636) Source: CCN Type: MediaWiki Web site [SECURITY] Apply a stricter policy to smarty templates. Source: MISC Type: Third Party Advisory https://gerrit.wikimedia.org/r/q/Ic899a8b15bc510e61cdacb5c024af2d226a2dbeb Source: CCN Type: Phabricator Web page RCE in Widgets extension (CVE-2020-35625) Source: MISC Type: Third Party Advisory https://phabricator.wikimedia.org/T269718 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||||||
BACK |