9.8
CVSSv3

CVE-2020-29007

Published: 15/04/2023 Updated: 26/04/2023
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

The Score extension up to and including 0.3.0 for MediaWiki has a remote code execution vulnerability due to improper sandboxing of the GNU LilyPond executable. This allows any user with an ability to edit articles (potentially including unauthenticated anonymous users) to execute arbitrary Scheme or shell code by using crafted {{Image data to generate musical scores containing malicious code.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

mediawiki score

Github Repositories

My writeup for PKU GeekGame 2nd

GeekGame 2nd Writeup by mariodon 签到 一开始做这道题时感觉有点懵,因为我这使用浏览器打开 pdf,再和去年一样 Ctrl + A Ctrl + C 就把 flag 复制出来了,还真以为出了一道和去年一样的签到题呢。 后来看问卷才注意到 pdf 开了禁止复制。 这个故事告诉我们,选择正确的工具还是很重要的,可以少

Remote code execution in Mediawiki Score

CVEID: CVE-2020-29007 Name of the affected product(s) and version(s): Mediawiki Score (all versions up to 030) Problem type: CWE-96: Improper Neutralization of Directives in Statically Saved Code (‘Static Code Injection’) Summary Score is a Mediawiki extension which generates musical notation based on user-provided Lilypond or ABC markup During our tests, we hav

My PKU GeekGame2022 Writeup

PKU GeekGame 2 Writeup 比赛网站: geekgamepkueducn/ 题目源码与官方题解: githubcom/PKU-GeekGame/geekgame-2nd 用户名: std::_Rb_tree 总分: 3903 总排名: 6 编原译理习题课 Flag 1: 让 g++ 编译出的程序超过 8MB 方法1: 让 data 非常大 int arr[1 << 24] = { 1, 1, 4, 5, 1, 4 }; int main() { } //EOF

Projekt finalnej strony www Menu Komponenty ToDo wprowadzenie treści do wszystkich stron z usługami dodanie animacji modyfikacja strony tytułowej wg scenariusza Eugeniusza dodanie obsług landing pages dla GB, DE, CH dodanie artykułów z blogu dodanie newsów dodanie oprawnych description dla wszystkich plików automatyzacja publikacji (Cloudfla

Snippets and scripts for exploiting Lilypond installations

Introduction This is a collection of code snippets and scripts useful for attacking vulnerable GNU Lilypond installations More generally, it can be used to prepare attack payloads for any vulnerability which results in injection of Scheme code in the GNU Guile interpreter, however newer versions of Guile might allow for easier attacks (eg all the tricks which read commands o