CVE-2020-15179

The ScratchSig extension for MediaWiki before version 1.0.1 allows stored Cross-Site Scripting. Using <script> tag inside <scratchsig> tag, attackers with edit permission can execute scripts on visitors' browser. With MediaWiki JavaScript API, this can potentially lead to privilege escalation and/or account takeover. This has been patched in release 1.0.1. This has already been deployed to all Scratch Wikis. No workarounds exist other than disabling the extension completely.
Configurations

Configuration 1 (hide)

cpe:2.3:a:scratch-wiki:scratchsig:*:*:*:*:*:mediawiki:*:*

History

21 Nov 2024, 05:05

Type Values Removed Values Added
References () https://github.com/InternationalScratchWiki/wiki-scratchsig/commit/4160a39a20eebeb63a59eb7597a91b961eca6388 - Patch, Third Party Advisory () https://github.com/InternationalScratchWiki/wiki-scratchsig/commit/4160a39a20eebeb63a59eb7597a91b961eca6388 - Patch, Third Party Advisory
References () https://github.com/InternationalScratchWiki/wiki-scratchsig/security/advisories/GHSA-gp9v-pg9f-vmp6 - Third Party Advisory () https://github.com/InternationalScratchWiki/wiki-scratchsig/security/advisories/GHSA-gp9v-pg9f-vmp6 - Third Party Advisory
CVSS v2 : 4.6
v3 : 9.0
v2 : 4.6
v3 : 8.0

Information

Published : 2020-09-15 18:15

Updated : 2024-11-21 05:05


NVD link : CVE-2020-15179

Mitre link : CVE-2020-15179

CVE.ORG link : CVE-2020-15179


JSON object : View

Products Affected

scratch-wiki

  • scratchsig
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')