The RandomGameUnit extension for MediaWiki through 1.35 was not properly escaping various title-related data. When certain varieties of games were created within MediaWiki, their names or titles could be manipulated to generate stored XSS within the RandomGameUnit extension.
                
            References
                    | Link | Resource | 
|---|---|
| https://gerrit.wikimedia.org/r/q/I497d2076038f75c9eb77e0e250f2af56f5bd2bfc | Patch Vendor Advisory | 
| https://phabricator.wikimedia.org/T266400 | Exploit Vendor Advisory | 
| https://gerrit.wikimedia.org/r/q/I497d2076038f75c9eb77e0e250f2af56f5bd2bfc | Patch Vendor Advisory | 
| https://phabricator.wikimedia.org/T266400 | Exploit Vendor Advisory | 
Configurations
                    History
                    21 Nov 2024, 05:22
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://gerrit.wikimedia.org/r/q/I497d2076038f75c9eb77e0e250f2af56f5bd2bfc - Patch, Vendor Advisory | |
| References | () https://phabricator.wikimedia.org/T266400 - Exploit, Vendor Advisory | 
Information
                Published : 2020-10-28 03:15
Updated : 2024-11-21 05:22
NVD link : CVE-2020-27957
Mitre link : CVE-2020-27957
CVE.ORG link : CVE-2020-27957
JSON object : View
Products Affected
                mediawiki
- mediawiki
CWE
                
                    
                        
                        CWE-79
                        
            Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
