Vulnerability Description
Cross-site request forgery (CSRF) vulnerability in the Special:ExpandedTemplates page in MediaWiki before 1.19.22, 1.20.x through 1.22.x before 1.22.14, and 1.23.x before 1.23.7, when $wgRawHTML is set to true, allows remote attackers to hijack the authentication of users with edit permissions for requests that cross-site scripting (XSS) attacks via the wpInput parameter, which is not properly handled in the preview.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mediawiki | Mediawiki | <= 1.19.21 |
Related Weaknesses (CWE)
References
- http://securitytracker.com/id?1031301
- http://www.openwall.com/lists/oss-security/2014/12/03/9
- http://www.openwall.com/lists/oss-security/2014/12/04/16
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-November/000170.htPatchVendor Advisory
- https://phabricator.wikimedia.org/T73111
- http://securitytracker.com/id?1031301
- http://www.openwall.com/lists/oss-security/2014/12/03/9
- http://www.openwall.com/lists/oss-security/2014/12/04/16
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-November/000170.htPatchVendor Advisory
- https://phabricator.wikimedia.org/T73111
FAQ
What is CVE-2014-9276?
CVE-2014-9276 is a vulnerability with a CVSS score of 5.1 (MEDIUM). Cross-site request forgery (CSRF) vulnerability in the Special:ExpandedTemplates page in MediaWiki before 1.19.22, 1.20.x through 1.22.x before 1.22.14, and 1.23.x before 1.23.7, when $wgRawHTML is se...
How severe is CVE-2014-9276?
CVE-2014-9276 has been rated MEDIUM with a CVSS base score of 5.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-9276?
Check the references section above for vendor advisories and patch information. Affected products include: Mediawiki Mediawiki.