CVE-2022-34911

NameCVE-2022-34911
DescriptionAn issue was discovered in MediaWiki before 1.35.7, 1.36.x and 1.37.x before 1.37.3, and 1.38.x before 1.38.1. XSS can occur in configurations that allow a JavaScript payload in a username. After account creation, when it sets the page title to "Welcome" followed by the username, the username is not escaped: SpecialCreateAccount::successfulAction() calls ::showSuccessPage() with a message as second parameter, and OutputPage::setPageTitle() uses text().
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
mediawiki (PTS)buster, buster (security)1:1.31.16-1+deb10u2vulnerable
bullseye (security), bullseye1:1.35.4-1+deb11u2vulnerable
bookworm, sid1:1.35.7-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
mediawikisource(unstable)1:1.35.7-1

Notes

[bullseye] - mediawiki <postponed> (Minor issue, fix along with next security release)
[buster] - mediawiki <postponed> (Minor issue, fix along with next security release)
https://phabricator.wikimedia.org/T308471
https://gerrit.wikimedia.org/r/c/mediawiki/core/+/805208
https://lists.wikimedia.org/hyperkitty/list/wikitech-l@lists.wikimedia.org/thread/PIPYDRSHXOYW5DB7X755QDNUV5EZWPWB/

Search for package or bug name: Reporting problems