4.3
CVSSv2

CVE-2008-5249

Published: 19/12/2008 Updated: 14/10/2009
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

Cross-site scripting (XSS) vulnerability in MediaWiki 1.13.0 up to and including 1.13.2 allows remote malicious users to inject arbitrary web script or HTML via unspecified vectors.

Vulnerable Product Search on Vulmon Subscribe to Product

mediawiki mediawiki 1.13.2

mediawiki mediawiki 1.13.1

mediawiki mediawiki 1.13.0

Vendor Advisories

Several vulnerabilities have been discovered in mediawiki17, a website engine for collaborative work The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2008-5249 David Remahl discovered that mediawiki17 is prone to a cross-site scripting attack CVE-2008-5250 David Remahl discovered that mediawiki17, when I ...
Debian Bug report logs - #508868 CVE-2008-5249: XSS vulnerability in MediaWiki Package: mediawiki; Maintainer for mediawiki is Kunal Mehta <legoktm@debianorg>; Source for mediawiki is src:mediawiki (PTS, buildd, popcon) Reported by: Raphael Geissert <atomo64@gmailcom> Date: Tue, 16 Dec 2008 04:48:01 UTC Severity: ...
Debian Bug report logs - #508869 CVE-2008-5250: several local script injection vulnerabilities in MediaWiki Package: mediawiki; Maintainer for mediawiki is Kunal Mehta <legoktm@debianorg>; Source for mediawiki is src:mediawiki (PTS, buildd, popcon) Reported by: Raphael Geissert <atomo64@gmailcom> Date: Tue, 16 Dec ...
Debian Bug report logs - #508870 CVE-2008-5252: CSRF vulnerability affecting the Special:Import feature in MediaWiki Package: mediawiki; Maintainer for mediawiki is Kunal Mehta <legoktm@debianorg>; Source for mediawiki is src:mediawiki (PTS, buildd, popcon) Reported by: Raphael Geissert <atomo64@gmailcom> Date: Tue ...

Github Repositories

OWASP-Top-10-practice This repository used for save results of learning Web Application Security on practice It contains files by categories OWASP TOP10 2013 At the beginning those files were with vulnerable code After some tests, vulnerabilities were patched If you want, you may use this files to your experiments It is very easy to make files vulnerable again Links, that