Linux Security
    Linux Security
    Linux Security

    ArchLinux: 202101-22: mediawiki: multiple issues

    Date 15 Jan 2021
    Posted By LinuxSecurity Advisories
    The package mediawiki before version 1.35.1-1 is vulnerable to multiple issues including cross-site scripting and information disclosure.
    Arch Linux Security Advisory ASA-202101-22
    Severity: Medium
    Date    : 2021-01-12
    CVE-ID  : CVE-2020-35474 CVE-2020-35475 CVE-2020-35477 CVE-2020-35478
              CVE-2020-35479 CVE-2020-35480
    Package : mediawiki
    Type    : multiple issues
    Remote  : Yes
    Link    :
    The package mediawiki before version 1.35.1-1 is vulnerable to multiple
    issues including cross-site scripting and information disclosure.
    Upgrade to 1.35.1-1.
    # pacman -Syu "mediawiki>=1.35.1-1"
    The problems have been fixed upstream in version 1.35.1.
    - CVE-2020-35474 (cross-site scripting)
    In MediaWiki before 1.35.1, the combination of Html::rawElement and
    Message::text leads to XSS because the definition of
    MediaWiki:recentchanges-legend-watchlistexpiry can be changed onwiki so
    that the output is raw HTML.
    - CVE-2020-35475 (cross-site scripting)
    In MediaWiki before 1.35.1, the messages userrights-expiry-current and
    userrights-expiry-none can contain raw HTML. XSS can happen when a user
    visits Special:UserRights but does not have rights to change all
    userrights, and the table on the left side has unchangeable groups in
    it. (The right column with the changeable groups is not affected and is
    escaped correctly.)
    - CVE-2020-35477 (information disclosure)
    MediaWiki before 1.35.1 blocks legitimate attempts to hide log entries
    in some situations. If one sets MediaWiki:Mainpage to
    Special:MyLanguage/Main Page, visits a log entry on Special:Log, and
    toggles the "Change visibility of selected log entries" checkbox (or a
    tags checkbox) next to it, there is a redirection to the main page's
    action=historysubmit (instead of the desired behavior in which a
    revision-deletion form appears).
    - CVE-2020-35478 (cross-site scripting)
    MediaWiki before 1.35.1 allows XSS via BlockLogFormatter.php.
    MediaWiki:blanknamespace potentially can be output as raw HTML with
    SCRIPT tags via LogFormatter::makePageLink(). This affects MediaWiki
    1.33.0 and later.
    - CVE-2020-35479 (cross-site scripting)
    MediaWiki before 1.35.1 allows XSS via BlockLogFormatter.php.
    Language::translateBlockExpiry itself does not escape in all code
    paths. For example, the return of Language::userTimeAndDate is is
    always unsafe for HTML in a month value. This affects MediaWiki 1.12.0
    and later.
    - CVE-2020-35480 (information disclosure)
    An issue was discovered in MediaWiki before 1.35.1. Missing users
    (accounts that don't exist) and hidden users (accounts that have been
    explicitly hidden due to being abusive, or similar) that the viewer
    cannot see are handled differently, exposing sensitive information
    about the hidden status to unprivileged viewers. This exists on various
    code paths.
    A malicious remote user might execute code in the browser or disclose
    sensitive information.

    LinuxSecurity Poll

    'Tis the season of giving! How have you given back to the open-source community?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"171","title":"I've contributed to the development of an open-source project.","votes":"22","type":"x","order":"1","pct":34.92,"resources":[]},{"id":"172","title":"I've reviewed open-source code for security bugs.","votes":"13","type":"x","order":"2","pct":20.63,"resources":[]},{"id":"173","title":"I've made a donation to an open-source project.","votes":"28","type":"x","order":"3","pct":44.44,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.