A vulnerability was found in the SyntaxHighlight MediaWiki extension. Using this vulnerability it is possible for an anonymous attacker to pass arbitrary options to the Pygments library. By specifying specially crafted options, it is possible for an attacker to trigger a (stored) Cross-Site Scripting condition. In addition, it allows the creating of arbitrary files containing user-controllable data. Depending on the server configuration, this can be used by an anonymous attacker to execute arbitrary PHP code. Upstream bug: https://phabricator.wikimedia.org/T158689 References: https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000209.html http://seclists.org/fulldisclosure/2017/Apr/109
Created mediawiki tracking bugs for this issue: Affects: fedora-all [bug 1448111] Created mediawiki119 tracking bugs for this issue: Affects: epel-6 [bug 1448110] Created mediawiki123 tracking bugs for this issue: Affects: epel-7 [bug 1448112]
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.