We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-47612

XSS in Special:DataDump when displaying dump status



Description

DataDump is a MediaWiki extension that provides dumps of wikis. Several interface messages are unescaped (more specifically, (datadump-table-column-queued), (datadump-table-column-in-progress), (datadump-table-column-completed), (datadump-table-column-failed)). If these messages are edited (which requires the (editinterface) right by default), anyone who can view Special:DataDump (which requires the (view-dump) right by default) can be XSSed. This vulnerability is fixed with 601688ee8e8808a23b102fa305b178f27cbd226d.

Reserved 2024-09-27 | Published 2024-10-02 | Updated 2024-10-02 | Assigner GitHub_M


LOW: 3.5CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)

Product status

< 601688ee8e8808a23b102fa305b178f27cbd226d
affected

References

github.com/...taDump/security/advisories/GHSA-h8x8-24c7-r2rj

github.com/...601688ee8e8808a23b102fa305b178f27cbd226d.patch

issue-tracker.miraheze.org/T12670

cve.org (CVE-2024-47612)

nvd.nist.gov (CVE-2024-47612)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-47612

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.