CVE-2020-25828

NameCVE-2020-25828
DescriptionAn issue was discovered in MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4. The non-jqueryMsg version of mw.message().parse() doesn't escape HTML. This affects both message contents (which are generally safe) and the parameters (which can be based on user input). (When jqueryMsg is loaded, it correctly accepts only whitelisted tags in message contents, and escapes all parameters. Situations with an unloaded jqueryMsg are rare in practice, but can for example occur for Special:SpecialPages on a wiki with no extensions installed.)
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-2379-1, DSA-4767-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
mediawiki (PTS)buster, buster (security)1:1.31.16-1+deb10u2fixed
bullseye (security), bullseye1:1.35.4-1+deb11u2fixed
bookworm1:1.35.6-1fixed
sid1:1.35.7-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
mediawikisourcestretch1:1.27.7-1~deb9u4DLA-2379-1
mediawikisourcebuster1:1.31.10-1~deb10u1DSA-4767-1
mediawikisource(unstable)1:1.35.0-1

Notes

https://lists.wikimedia.org/pipermail/wikitech-l/2020-September/093888.html
https://phabricator.wikimedia.org/T115888

Search for package or bug name: Reporting problems