Vulnerability Description
MediaWiki before 1.5.4 uses a hard-coded "internal placeholder string", which allows remote attackers to bypass protection against cross-site scripting (XSS) attacks and execute Javascript using inline style attributes, which are processed by Internet Explorer.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mediawiki | Mediawiki | <= 1.5.3 |
References
- http://lists.suse.com/archive/suse-security-announce/2006-Feb/0001.html
- http://secunia.com/advisories/18219PatchVendor Advisory
- http://secunia.com/advisories/18717
- http://www.mediawiki.org/wiki/DownloadPatch
- http://www.securityfocus.com/bid/16032Patch
- http://www.vupen.com/english/advisories/2005/3059
- https://exchange.xforce.ibmcloud.com/vulnerabilities/23882
- http://lists.suse.com/archive/suse-security-announce/2006-Feb/0001.html
- http://secunia.com/advisories/18219PatchVendor Advisory
- http://secunia.com/advisories/18717
- http://www.mediawiki.org/wiki/DownloadPatch
- http://www.securityfocus.com/bid/16032Patch
- http://www.vupen.com/english/advisories/2005/3059
- https://exchange.xforce.ibmcloud.com/vulnerabilities/23882
FAQ
What is CVE-2005-4501?
CVE-2005-4501 is a vulnerability with a CVSS score of 4.3 (MEDIUM). MediaWiki before 1.5.4 uses a hard-coded "internal placeholder string", which allows remote attackers to bypass protection against cross-site scripting (XSS) attacks and execute Javascript using inlin...
How severe is CVE-2005-4501?
CVE-2005-4501 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-4501?
Check the references section above for vendor advisories and patch information. Affected products include: Mediawiki Mediawiki.