BIT-mediawiki-2020-35625

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/mediawiki/BIT-mediawiki-2020-35625.json
JSON Data
https://api.osv.dev/v1/vulns/BIT-mediawiki-2020-35625
Aliases
Published
2024-03-06T11:13:08.576Z
Modified
2024-03-06T11:25:28.861Z
Summary
[none]
Details

An issue was discovered in the Widgets extension for MediaWiki through 1.35.1. Any user with the ability to edit pages within the Widgets namespace could call any static function within any class (defined within PHP or MediaWiki) via a crafted HTML comment, related to a Smarty template. For example, a person in the Widget Editors group could use \MediaWiki\Shell\Shell::command within a comment.

Database specific
{
    "cpes": [
        "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*"
    ],
    "severity": "High"
}
References

Affected packages

Bitnami / mediawiki

Package

Name
mediawiki
Purl
pkg:bitnami/mediawiki

Severity

  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.35.1