Vulnerability identifier: #VU37971
Vulnerability risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID:
CWE-ID:
CWE-20
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
MediaWiki
Web applications /
CMS
Debian Linux
Operating systems & Components /
Operating system
Vendor:
MediaWiki.org
Debian
Description
The vulnerability allows a remote non-authenticated attacker to manipulate data.
The language converter in MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2 allows attribute injection attacks via glossary rules.
Mitigation
Install update from vendor's website.
Vulnerable software versions
MediaWiki: 1.28.0 - 1.29.1
Debian Linux: 1.28.0 - 9.0
External links
https://www.securitytracker.com/id/1039812
https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-November/000216.html
https://www.debian.org/security/2017/dsa-4036
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.