Vulnerability CVE-2019-19329


Published: 2019-11-27   Modified: 2019-11-29

Description:
In Wikibase Wikidata Query Service GUI before 0.3.6-SNAPSHOT 2019-11-07, when mathematical expressions in results are displayed directly, arbitrary JavaScript execution can occur, aka XSS. This was addressed by introducing MathJax as a new mathematics rendering engine. NOTE: this GUI code is no longer bundled with the Wikibase Wikidata Query Service snapshots, such as 0.3.6-SNAPSHOT.

Type:

CWE-79

(Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'))

CVSS2 => (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Wikimedia -> Wikidata query gui 

 References:
https://gerrit.wikimedia.org/g/wikidata/query/gui/+/d9f964b88c01748e278ca8c4b8929a8ef0ef0267
https://gerrit.wikimedia.org/r/#/c/wikidata/query/gui/+/549457/
https://lists.wikimedia.org/pipermail/wikidata-tech/2019-November/001492.html
https://phabricator.wikimedia.org/T233213

Copyright 2024, cxsecurity.com

 

Back to Top