Vulnerability Details : CVE-2022-28201
Potential exploit
An issue was discovered in MediaWiki before 1.35.6, 1.36.x before 1.36.4, and 1.37.x before 1.37.2. Users with the editinterface permission can trigger infinite recursion, because a bare local interwiki is mishandled for the mainpage message.
Products affected by CVE-2022-28201
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
- cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*
- cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*
- cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-28201
0.06%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 27 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-28201
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.4
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
0.8
|
3.6
|
NIST |
CWE ids for CVE-2022-28201
-
The product does not properly control the amount of recursion that takes place, consuming excessive resources, such as allocated memory or the program stack.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-28201
-
https://lists.debian.org/debian-lts-announce/2022/09/msg00027.html
[SECURITY] [DLA 3117-1] mediawiki security updateMailing List;Third Party Advisory
-
https://blog.legoktm.com/2022/07/03/a-belated-writeup-of-cve-2022-28201-in-mediawiki.html
A belated writeup of CVE-2022-28201 in MediaWiki - The Lego MirrorExploit;Third Party Advisory
-
https://www.debian.org/security/2022/dsa-5246
Debian -- Security Information -- DSA-5246-1 mediawikiThird Party Advisory
-
https://phabricator.wikimedia.org/T297571
⚓ T297571 CVE-2022-28201: Title::newMainPage() goes into an infinite recursion loop if it points to a local interwikiPatch;Vendor Advisory
Jump to