ALT-PU-2020-3022-1
Closed vulnerabilities
BDU:2021-01718
Уязвимость функции check_output из output.c SUID изолированной программной среды Firejail, связанная с отсутствием мер по нейтрализации специальных элементов, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01721
Уязвимость функции check_output из output.c SUID изолированной программной среды Firejail, связанная с отсутствием мер по нейтрализации специальных элементов, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-07042
Уязвимость компонента Special:Contributions программного средства для реализации гипертекстовой среды MediaWiki, позволяющая нарушителю провести атаку межсайтового скриптинга (XSS)
BDU:2022-07043
Уязвимость компонента Special:UserRights программного средства для реализации гипертекстовой среды MediaWiki, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2022-07044
Уязвимость функции mw.message.parse() программного средства для реализации гипертекстовой среды MediaWiki, позволяющая нарушителю провести атаку межсайтового скриптинга (XSS)
BDU:2022-07046
Уязвимость расширения OATHAuth программного средства для реализации гипертекстовой среды MediaWiki, позволяющая нарушителю обойти существующие ограничения безопасности с помощью атаки методом «грубой силы» (brute force)
Modified: 2024-11-21
CVE-2020-10959
resources/src/mediawiki.page.ready/ready.js in MediaWiki before 1.35 allows remote attackers to force a logout and external redirection via HTML content in a MediaWiki page.
Modified: 2024-11-21
CVE-2020-17367
Firejail through 0.9.62 does not honor the -- end-of-options indicator after the --output option, which may lead to command injection.
- openSUSE-SU-2020:1208
- openSUSE-SU-2020:1208
- https://github.com/netblue30/firejail
- https://github.com/netblue30/firejail
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2336-1] firejail security update
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2336-1] firejail security update
- FEDORA-2020-80a6d7e7e0
- FEDORA-2020-80a6d7e7e0
- FEDORA-2020-45fc8559d5
- FEDORA-2020-45fc8559d5
- GLSA-202101-02
- GLSA-202101-02
- https://www.debian.org/security/2020/dsa-4742
- https://www.debian.org/security/2020/dsa-4742
- DSA-4743
- DSA-4743
Modified: 2024-11-21
CVE-2020-17368
Firejail through 0.9.62 mishandles shell metacharacters during use of the --output or --output-stderr option, which may lead to command injection.
- openSUSE-SU-2020:1208
- openSUSE-SU-2020:1208
- https://github.com/netblue30/firejail/
- https://github.com/netblue30/firejail/
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2336-1] firejail security update
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2336-1] firejail security update
- FEDORA-2020-80a6d7e7e0
- FEDORA-2020-80a6d7e7e0
- FEDORA-2020-45fc8559d5
- FEDORA-2020-45fc8559d5
- GLSA-202101-02
- GLSA-202101-02
- DSA-4742
- DSA-4742
- DSA-4743
- DSA-4743
Modified: 2024-11-21
CVE-2020-25812
An issue was discovered in MediaWiki 1.34.x before 1.34.4. On Special:Contributions, the NS filter uses unescaped messages as keys in the option key for an HTMLForm specifier. This is vulnerable to a mild XSS if one of those messages is changed to include raw HTML.
- https://gerrit.wikimedia.org/g/mediawiki/core/+/ad4a3ba45fb955aa8c0eb3c83809b16b40a498b9/includes/specials/SpecialContributions.php#592
- https://gerrit.wikimedia.org/g/mediawiki/core/+/ad4a3ba45fb955aa8c0eb3c83809b16b40a498b9/includes/specials/SpecialContributions.php#592
- FEDORA-2020-a4802c53d9
- FEDORA-2020-a4802c53d9
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html
Modified: 2024-11-21
CVE-2020-25813
In MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4, Special:UserRights exposes the existence of hidden users.
- FEDORA-2020-a4802c53d9
- FEDORA-2020-a4802c53d9
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html
- https://meta.wikimedia.org/wiki/Special:UserRights
- https://meta.wikimedia.org/wiki/Special:UserRights
Modified: 2024-11-21
CVE-2020-25814
In MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4, XSS related to jQuery can occur. The attacker creates a message with [javascript:payload xss] and turns it into a jQuery object with mw.message().parse(). The expected result is that the jQuery object does not contain an tag (or it does not have a href attribute, or it's empty, etc.). The actual result is that the object contains an
- FEDORA-2020-a4802c53d9
- FEDORA-2020-a4802c53d9
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html
- https://www.mediawiki.org/wiki/ResourceLoader/Core_modules#mediawiki.jqueryMsg
- https://www.mediawiki.org/wiki/ResourceLoader/Core_modules#mediawiki.jqueryMsg
Modified: 2024-11-21
CVE-2020-25815
An issue was discovered in MediaWiki 1.32.x through 1.34.x before 1.34.4. LogEventList::getFiltersDesc is insecurely using message text to build options names for an HTML multi-select field. The relevant code should use escaped() instead of text().
- https://gerrit.wikimedia.org/g/mediawiki/core/+/ec76e14be658187544f07c1a249a047e1a75eaf8/includes/logging/LogEventsList.php#214
- https://gerrit.wikimedia.org/g/mediawiki/core/+/ec76e14be658187544f07c1a249a047e1a75eaf8/includes/logging/LogEventsList.php#214
- FEDORA-2020-a4802c53d9
- FEDORA-2020-a4802c53d9
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html
Modified: 2024-11-21
CVE-2020-25827
An issue was discovered in the OATHAuth extension in MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4. For Wikis using OATHAuth on a farm/cluster (such as via CentralAuth), rate limiting of OATH tokens is only done on a single site level. Thus, multiple requests can be made across many wikis/sites concurrently.
- FEDORA-2020-a4802c53d9
- FEDORA-2020-a4802c53d9
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html
- https://phabricator.wikimedia.org/T251661
- https://phabricator.wikimedia.org/T251661
Modified: 2024-11-21
CVE-2020-25828
An issue was discovered in MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4. The non-jqueryMsg version of mw.message().parse() doesn't escape HTML. This affects both message contents (which are generally safe) and the parameters (which can be based on user input). (When jqueryMsg is loaded, it correctly accepts only whitelisted tags in message contents, and escapes all parameters. Situations with an unloaded jqueryMsg are rare in practice, but can for example occur for Special:SpecialPages on a wiki with no extensions installed.)
- FEDORA-2020-a4802c53d9
- FEDORA-2020-a4802c53d9
- https://lists.wikimedia.org/pipermail/mediawiki-announce
- https://lists.wikimedia.org/pipermail/mediawiki-announce
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html
Modified: 2024-11-21
CVE-2020-25869
An information leak was discovered in MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4. Handling of actor ID does not necessarily use the correct database or correct wiki.
- FEDORA-2020-a4802c53d9
- FEDORA-2020-a4802c53d9
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048480.html
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html
- https://lists.wikimedia.org/pipermail/mediawiki-l/2020-September/048488.html
- https://phabricator.wikimedia.org/T260485
- https://phabricator.wikimedia.org/T260485
Modified: 2024-11-21
CVE-2020-26120
XSS exists in the MobileFrontend extension for MediaWiki before 1.34.4 because section.line is mishandled during regex section line replacement from PageGateway. Using crafted HTML, an attacker can elicit an XSS attack via jQuery's parseHTML method, which can cause image callbacks to fire even without the element being appended to the DOM.
Modified: 2024-11-21
CVE-2020-26121
An issue was discovered in the FileImporter extension for MediaWiki before 1.34.4. An attacker can import a file even when the target page is protected against "page creation" and the attacker should not be able to create it. This occurs because of a mishandled distinction between an upload restriction and a create restriction. An attacker cannot leverage this to overwrite anything, but can leverage this to force a wiki to have a page with a disallowed title.
- https://commons.wikimedia.org/w/index.php?oldid=454609892#File:Wiki.png
- https://commons.wikimedia.org/w/index.php?oldid=454609892#File:Wiki.png
- https://gerrit.wikimedia.org/r/q/Ib852a96afc4dca10516d0510e69c10f9892b351b
- https://gerrit.wikimedia.org/r/q/Ib852a96afc4dca10516d0510e69c10f9892b351b
- FEDORA-2020-a4802c53d9
- FEDORA-2020-a4802c53d9
- https://phabricator.wikimedia.org/T262628
- https://phabricator.wikimedia.org/T262628
Modified: 2024-11-21
CVE-2020-27957
The RandomGameUnit extension for MediaWiki through 1.35 was not properly escaping various title-related data. When certain varieties of games were created within MediaWiki, their names or titles could be manipulated to generate stored XSS within the RandomGameUnit extension.
Modified: 2024-11-21
CVE-2020-29002
includes/CologneBlueTemplate.php in the CologneBlue skin for MediaWiki through 1.35 allows XSS via a qbfind message supplied by an administrator.
Modified: 2024-11-21
CVE-2020-29003
The PollNY extension for MediaWiki through 1.35 allows XSS via an answer option for a poll question, entered during Special:CreatePoll or Special:UpdatePoll.
Modified: 2024-11-21
CVE-2020-29004
The API in the Push extension for MediaWiki through 1.35 did not require an edit token in ApiPushBase.php and therefore facilitated a CSRF attack.
- https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Push/+/625988
- https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Push/+/625988
- https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Push/+/625988/10/src/api/ApiPushBase.php
- https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Push/+/625988/10/src/api/ApiPushBase.php
- https://phabricator.wikimedia.org/T262724
- https://phabricator.wikimedia.org/T262724
Modified: 2024-11-21
CVE-2020-29005
The API in the Push extension for MediaWiki through 1.35 used cleartext for ApiPush credentials, allowing for potential information disclosure.