CVE-2014-7295 : Detail

CVE-2014-7295

Cross-site Scripting
A03-Injection
0.14%V3
Network
2014-10-07
12h00 +00:00
2015-04-28
11h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

The (1) Special:Preferences and (2) Special:UserLogin pages in MediaWiki before 1.19.20, 1.22.x before 1.22.12 and 1.23.x before 1.23.5 allows remote authenticated users to conduct cross-site scripting (XSS) attacks or have unspecified other impact via crafted CSS, as demonstrated by modifying MediaWiki:Common.css.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.

Metrics

Metrics Score Severity CVSS Vector Source
V2 3.5 AV:N/AC:M/Au:S/C:N/I:P/A:N nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Products Mentioned

Configuraton 0

Mediawiki>>Mediawiki >> Version To (including) 1.19.19

Mediawiki>>Mediawiki >> Version 1.19

Mediawiki>>Mediawiki >> Version 1.19

Mediawiki>>Mediawiki >> Version 1.19

Mediawiki>>Mediawiki >> Version 1.19.0

Mediawiki>>Mediawiki >> Version 1.19.1

Mediawiki>>Mediawiki >> Version 1.19.2

Mediawiki>>Mediawiki >> Version 1.19.3

Mediawiki>>Mediawiki >> Version 1.19.4

Mediawiki>>Mediawiki >> Version 1.19.5

Mediawiki>>Mediawiki >> Version 1.19.6

Mediawiki>>Mediawiki >> Version 1.19.7

Mediawiki>>Mediawiki >> Version 1.19.8

Mediawiki>>Mediawiki >> Version 1.19.9

Mediawiki>>Mediawiki >> Version 1.19.10

Mediawiki>>Mediawiki >> Version 1.19.11

Mediawiki>>Mediawiki >> Version 1.19.12

Mediawiki>>Mediawiki >> Version 1.19.13

Mediawiki>>Mediawiki >> Version 1.19.14

Mediawiki>>Mediawiki >> Version 1.19.15

Mediawiki>>Mediawiki >> Version 1.19.16

Mediawiki>>Mediawiki >> Version 1.19.17

Mediawiki>>Mediawiki >> Version 1.19.18

Mediawiki>>Mediawiki >> Version 1.22.0

Mediawiki>>Mediawiki >> Version 1.22.1

Mediawiki>>Mediawiki >> Version 1.22.2

Mediawiki>>Mediawiki >> Version 1.22.3

Mediawiki>>Mediawiki >> Version 1.22.4

Mediawiki>>Mediawiki >> Version 1.22.5

Mediawiki>>Mediawiki >> Version 1.22.6

Mediawiki>>Mediawiki >> Version 1.22.7

Mediawiki>>Mediawiki >> Version 1.22.8

Mediawiki>>Mediawiki >> Version 1.22.9

Mediawiki>>Mediawiki >> Version 1.22.10

Mediawiki>>Mediawiki >> Version 1.22.11

Mediawiki>>Mediawiki >> Version 1.23.0

Mediawiki>>Mediawiki >> Version 1.23.1

Mediawiki>>Mediawiki >> Version 1.23.2

Mediawiki>>Mediawiki >> Version 1.23.3

Mediawiki>>Mediawiki >> Version 1.23.4

References

http://www.debian.org/security/2014/dsa-3046
Tags : vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/61752
Tags : third-party-advisory, x_refsource_SECUNIA
http://seclists.org/oss-sec/2014/q4/67
Tags : mailing-list, x_refsource_MLIST
http://www.securityfocus.com/bid/70238
Tags : vdb-entry, x_refsource_BID