CVE-2011-1578
Severity CVSS v4.0:
Pending analysis
Type:
CWE-79
Cross-Site Scripting (XSS)
Publication date:
27/04/2011
Last modified:
11/04/2025
Description
Cross-site scripting (XSS) vulnerability in MediaWiki before 1.16.3, when Internet Explorer 6 or earlier is used, allows remote attackers to inject arbitrary web script or HTML via an uploaded file accessed with a dangerous extension such as .html at the end of the query string, in conjunction with a modified URI path that has a %2E sequence in place of the . (dot) character.
Impact
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:* | 1.16.2 (including) | |
cpe:2.3:a:mediawiki:mediawiki:1.1.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:mediawiki:mediawiki:1.2.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:mediawiki:mediawiki:1.2.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:mediawiki:mediawiki:1.2.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:mediawiki:mediawiki:1.2.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:mediawiki:mediawiki:1.2.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:mediawiki:mediawiki:1.2.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:mediawiki:mediawiki:1.2.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:mediawiki:mediawiki:1.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:mediawiki:mediawiki:1.3.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:mediawiki:mediawiki:1.3.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:mediawiki:mediawiki:1.3.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:mediawiki:mediawiki:1.3.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:mediawiki:mediawiki:1.3.4:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058588.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058910.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059232.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059235.html
- http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-April/000096.html
- http://openwall.com/lists/oss-security/2011/04/13/15
- http://secunia.com/advisories/44142
- http://www.debian.org/security/2011/dsa-2366
- http://www.securityfocus.com/bid/47354
- http://www.vupen.com/english/advisories/2011/0978
- http://www.vupen.com/english/advisories/2011/1100
- http://www.vupen.com/english/advisories/2011/1151
- https://bugzilla.redhat.com/show_bug.cgi?id=695577
- https://bugzilla.redhat.com/show_bug.cgi?id=696360
- https://bugzilla.wikimedia.org/show_bug.cgi?id=28235
- https://exchange.xforce.ibmcloud.com/vulnerabilities/66737
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058588.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058910.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059232.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059235.html
- http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-April/000096.html
- http://openwall.com/lists/oss-security/2011/04/13/15
- http://secunia.com/advisories/44142
- http://www.debian.org/security/2011/dsa-2366
- http://www.securityfocus.com/bid/47354
- http://www.vupen.com/english/advisories/2011/0978
- http://www.vupen.com/english/advisories/2011/1100
- http://www.vupen.com/english/advisories/2011/1151
- https://bugzilla.redhat.com/show_bug.cgi?id=695577
- https://bugzilla.redhat.com/show_bug.cgi?id=696360
- https://bugzilla.wikimedia.org/show_bug.cgi?id=28235
- https://exchange.xforce.ibmcloud.com/vulnerabilities/66737