In Wikibase Wikidata Query Service GUI before 0.3.6-SNAPSHOT 2019-11-07, when mathematical expressions in results are displayed directly, arbitrary JavaScript execution can occur, aka XSS. This was addressed by introducing MathJax as a new mathematics rendering engine. NOTE: this GUI code is no longer bundled with the Wikibase Wikidata Query Service snapshots, such as 0.3.6-SNAPSHOT.
References
Link | Resource |
---|---|
https://gerrit.wikimedia.org/g/wikidata/query/gui/+/d9f964b88c01748e278ca8c4b8929a8ef0ef0267 | Mailing List Patch Vendor Advisory |
https://gerrit.wikimedia.org/r/#/c/wikidata/query/gui/+/549457/ | Patch Vendor Advisory |
https://lists.wikimedia.org/pipermail/wikidata-tech/2019-November/001492.html | Vendor Advisory |
https://phabricator.wikimedia.org/T233213 | Exploit Issue Tracking Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2019-11-27 16:15
Updated : 2024-02-04 20:39
NVD link : CVE-2019-19329
Mitre link : CVE-2019-19329
CVE.ORG link : CVE-2019-19329
JSON object : View
Products Affected
wikimedia
- wikidata_query_gui
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')