Vulnerability Details : CVE-2021-39186
GlobalNewFiles is a MediaWiki extension maintained by Miraheze. Prior to commit number cee254e1b158cdb0ddbea716b1d3edc31fa4fb5d, the username column of the GlobalNewFiles special page is vulnerable to a stored XSS. Commit number cee254e1b158cdb0ddbea716b1d3edc31fa4fb5d contains a patch. As a workaround, one may disallow <,> (or other characters required to insert html/js) from being used in account names so an XSS is not possible.
Vulnerability category: Cross site scripting (XSS)Input validation
Products affected by CVE-2021-39186
- cpe:2.3:a:miraheze:globalnewfiles:*:*:*:*:*:mediawiki:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-39186
0.10%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 41 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-39186
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST | |
6.1
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
2.8
|
2.7
|
NIST | |
4.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N |
2.8
|
1.4
|
GitHub, Inc. |
CWE ids for CVE-2021-39186
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: security-advisories@github.com (Primary)
References for CVE-2021-39186
-
https://github.com/miraheze/GlobalNewFiles/security/advisories/GHSA-57p5-hqjq-h7vg
Improper Input Validation in GlobalNewFiles · Advisory · miraheze/GlobalNewFiles · GitHubThird Party Advisory
-
https://phabricator.miraheze.org/T7935
⚓ T7935 Stored XSS in GlobalNewFiles (CVE-2021-39186)Exploit;Third Party Advisory
-
https://github.com/miraheze/GlobalNewFiles/commit/cee254e1b158cdb0ddbea716b1d3edc31fa4fb5d
SECURITY: Fix XSS issues GlobalNewFilesPager · miraheze/GlobalNewFiles@cee254e · GitHubPatch;Third Party Advisory
Jump to