DescriptionDhananjay Arunesh
2020-12-02 18:16:47 UTC
XSS exists in the MobileFrontend extension for MediaWiki before 1.34.4 because section.line is mishandled during regex section line replacement from PageGateway. Using crafted HTML, an attacker can elicit an XSS attack via jQuery's parseHTML method, which can cause image callbacks to fire even without the element being appended to the DOM.
References:
https://gerrit.wikimedia.org/r/q/I42e079bc875d17b336ab015f3678eaedc26e10eahttps://phabricator.wikimedia.org/T262213
Comment 1Dhananjay Arunesh
2020-12-02 18:17:13 UTC
Created mediawiki tracking bugs for this issue:
Affects: fedora-all [bug 1903753]
Comment 2Przemyslaw Roguski
2020-12-07 14:37:25 UTC
Comment 5Przemyslaw Roguski
2020-12-07 14:48:53 UTC
The vulnerability is directly related to MobileFrontent Extension, which is not bundled in the OpenShift mediawiki package.
Comment 6Przemyslaw Roguski
2020-12-07 16:48:34 UTC
Statement:
OpenShift Container Platform (OCP) delivers the mediawiki package, but the vulnerable code is not bundled, therefore OCP is not affected by this flaw.
Comment 7Product Security DevOps Team
2020-12-07 17:02:40 UTC