Skip to content

Cross-site Scripting in DaSchTour matomo-mediawiki-extension

Moderate severity GitHub Reviewed Published Feb 5, 2023 to the GitHub Advisory Database • Updated Oct 20, 2023

Package

composer mediawiki/matomo (Composer)

Affected versions

< 2.4.3

Patched versions

2.4.3

Description

A vulnerability classified as problematic has been found in DaSchTour matomo-mediawiki-extension up to 2.4.2. This affects an unknown part of the file Piwik.hooks.php of the component Username Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.4.3 is able to address this issue. The name of the patch is 681324e4f518a8af4bd1f93867074c728eb9923d. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-220203.

References

Published by the National Vulnerability Database Feb 5, 2023
Published to the GitHub Advisory Database Feb 5, 2023
Reviewed Feb 14, 2023
Last updated Oct 20, 2023

Severity

Moderate
6.1
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Weaknesses

CVE ID

CVE-2017-20175

GHSA ID

GHSA-hc67-v29c-7g78
Checking history
See something to contribute? Suggest improvements for this vulnerability.