Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.805327
Category:Web application abuses
Title:MediaWiki ExpandTemplates Extension < 1.24.1 Multiple Vulnerabilities (Jan 2015) - Active Check
Summary:The ExpandTemplates extension for MediaWiki is prone to multiple; vulnerabilities.
Description:Summary:
The ExpandTemplates extension for MediaWiki is prone to multiple
vulnerabilities.

Vulnerability Insight:
- Multiple flaws exist when'$wgRawHtml' is set to true

- Input passed via 'wpInput' parameter in the script is not validated before returning it to
users

Vulnerability Impact:
Successful exploitation will allow remote attacker to execute
arbitrary script code in a user's browser session within the trust relationship between their
browser and the server.

Affected Software/OS:
The ExpandTemplates extension for MediaWiki in versions prior
to 1.24.1.

Solution:
Update the ExpandTemplates extension to version 1.24.1 or
later.

CVSS Score:
5.1

CVSS Vector:
AV:N/AC:H/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2014-9276
https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-November/000170.html
http://www.openwall.com/lists/oss-security/2014/12/03/9
http://www.openwall.com/lists/oss-security/2014/12/04/16
http://securitytracker.com/id?1031301
Common Vulnerability Exposure (CVE) ID: CVE-2014-9478
https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-December/000173.html
http://www.openwall.com/lists/oss-security/2014/12/21/2
http://www.openwall.com/lists/oss-security/2015/01/03/13
CopyrightCopyright (C) 2015 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.