CVE-2017-0372
Parameters injection in SyntaxHighlight results in multiple vulnerabilities
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Parameters injection in the SyntaxHighlight extension of Mediawiki before 1.23.16, 1.27.3 and 1.28.2 might result in multiple vulnerabilities.
Inyección de parámetros en la extensión SyntaxHighlight de Mediawiki, en versiones anteriores a la 1.23.16, 1.27.3 y 1.28.2 podría resultar en múltiples vulnerabilidades.
A vulnerability was found in the SyntaxHighlight MediaWiki extension. Using this vulnerability it is possible for an anonymous attacker to pass arbitrary options to the Pygments library. By specifying specially crafted options, it is possible for an attacker to trigger a (stored) cross site scripting condition. In addition, it allows the creating of arbitrary files containing user-controllable data. Depending on the server configuration, this can be used by an anonymous attacker to execute arbitrary PHP code. This issue was tested on SyntaxHighlight version 2.0 as bundled with MediaWiki version 1.28.0.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2016-11-29 CVE Reserved
- 2017-04-29 CVE Published
- 2024-09-16 CVE Updated
- 2024-09-16 First Exploit
- 2024-09-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
https://bugs.debian.org/861585 | Third Party Advisory | |
https://security-tracker.debian.org/tracker/CVE-2017-0372 | Issue Tracking |
URL | Date | SRC |
---|---|---|
https://phabricator.wikimedia.org/T158689 | 2024-09-16 |
URL | Date | SRC |
---|---|---|
https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000207.html | 2018-05-17 | |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000209.html | 2018-05-17 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Mediawiki Search vendor "Mediawiki" | Mediawiki Search vendor "Mediawiki" for product "Mediawiki" | <= 1.23.15 Search vendor "Mediawiki" for product "Mediawiki" and version " <= 1.23.15" | - |
Affected
| ||||||
Mediawiki Search vendor "Mediawiki" | Mediawiki Search vendor "Mediawiki" for product "Mediawiki" | 1.27.0 Search vendor "Mediawiki" for product "Mediawiki" and version "1.27.0" | - |
Affected
| ||||||
Mediawiki Search vendor "Mediawiki" | Mediawiki Search vendor "Mediawiki" for product "Mediawiki" | 1.27.1 Search vendor "Mediawiki" for product "Mediawiki" and version "1.27.1" | - |
Affected
| ||||||
Mediawiki Search vendor "Mediawiki" | Mediawiki Search vendor "Mediawiki" for product "Mediawiki" | 1.27.2 Search vendor "Mediawiki" for product "Mediawiki" and version "1.27.2" | - |
Affected
| ||||||
Mediawiki Search vendor "Mediawiki" | Mediawiki Search vendor "Mediawiki" for product "Mediawiki" | 1.28.0 Search vendor "Mediawiki" for product "Mediawiki" and version "1.28.0" | - |
Affected
| ||||||
Mediawiki Search vendor "Mediawiki" | Mediawiki Search vendor "Mediawiki" for product "Mediawiki" | 1.28.1 Search vendor "Mediawiki" for product "Mediawiki" and version "1.28.1" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 7.0 Search vendor "Debian" for product "Debian Linux" and version "7.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
|