Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
Name CVE-2024-47815 First vendor Publication 2024-10-09
Vendor Cve Last vendor Modification 2024-10-10

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

IncidentReporting is a MediaWiki extension for moving incident reports from wikitext to database tables. There are a variety of Cross-site Scripting issues, though all of them require elevated permissions. Some are available to anyone who has the `editincidents` right, some are available to those who can edit interface messages (typically administrators and interface admins), and one is available to those who can edit LocalSettings.php. These issues have been addressed in commit `43896a4` and all users are advised to upgrade. Users unable to upgrade should prevent access to the Special:IncidentReports page.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47815

CWE : Common Weakness Enumeration

% Id Name
50 % CWE-80 Improper Sanitization of Script-Related HTML Tags in a Web Page (Basic XSS)
50 % CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)

Sources (Detail)

https://github.com/miraheze/IncidentReporting/commit/43896a47de4e05ac94ec0472...
https://github.com/miraheze/IncidentReporting/security/advisories/GHSA-9p36-h...
https://issue-tracker.miraheze.org/T12702
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2024-10-10 17:27:27
  • Multiple Updates
2024-10-10 00:27:27
  • First insertion