Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 716752 (CVE-2020-10959, CVE-2020-10960) - <www-apps/mediawiki-1.34.1: Multiple vulnerabilities (CVE-2020-{10959,10960})
Summary: <www-apps/mediawiki-1.34.1: Multiple vulnerabilities (CVE-2020-{10959,10960})
Alias: CVE-2020-10959, CVE-2020-10960
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
Whiteboard: B4 [noglsa cve]
Depends on:
Reported: 2020-04-09 04:24 UTC by Sam James
Modified: 2020-06-20 00:47 UTC (History)
2 users (show)

See Also:
Package list:
=www-apps/mediawiki-1.34.1 amd64 ppc x86
Runtime testing required: ---


Note You need to log in before you can comment on or make changes to this bug.
Description Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-04-09 04:24:15 UTC
1) CVE-2020-10960

"In MediaWiki before 1.34.1, users can add various Cascading Style Sheets (CSS) classes (which can affect what content is shown or hidden in the user interface) to arbitrary DOM nodes via HTML content within a MediaWiki page. This occurs because jquery.makeCollapsible allows applying an event handler to any Cascading Style Sheets (CSS) selector. There is no known way to exploit this for cross-site scripting (XSS)."

"SECURITY: jquery.makeCollapsible allows applying event handler to any CSS selector."


2) CVE-2020-10959

"User content can redirect the logout button to different URL"


3) XSS on Special:UserRights

"SECURITY: Fix HTML escaping in UserGroupMembership::getLink()."

Comment 1 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-04-09 04:26:10 UTC
@maintainer(s), please advise if ready for stabilisation, or call yourself.
Comment 2 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-04-09 04:40:52 UTC
Comment 3 Agostino Sarubbo gentoo-dev 2020-04-09 12:25:49 UTC
amd64 stable
Comment 4 Agostino Sarubbo gentoo-dev 2020-04-11 16:00:29 UTC
ppc stable
Comment 5 Agostino Sarubbo gentoo-dev 2020-04-11 16:13:04 UTC
x86 stable.

Maintainer(s), please cleanup.
Security, please vote.
Comment 6 Larry the Git Cow gentoo-dev 2020-04-12 04:38:10 UTC
The bug has been referenced in the following commit(s):

commit 3aab280b1d8d344e9067c17352eab7c2bad5cdca
Author:     Miroslav Šulc <>
AuthorDate: 2020-04-12 04:37:49 +0000
Commit:     Miroslav Šulc <>
CommitDate: 2020-04-12 04:37:49 +0000

    www-apps/mediawiki: removed old vulnerable 1.34.0
    Package-Manager: Portage-2.3.98, Repoman-2.3.22
    Signed-off-by: Miroslav Šulc <>

 www-apps/mediawiki/Manifest                |  1 -
 www-apps/mediawiki/mediawiki-1.34.0.ebuild | 79 ------------------------------
 2 files changed, 80 deletions(-)
Comment 7 NATTkA bot gentoo-dev 2020-04-12 19:20:50 UTC
Resetting sanity check; package list is empty or all packages are done.
Comment 8 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-04-16 21:42:17 UTC
I think we can classify these as XSS, so noglsa.

@robbat2, can you verify wiki.*'s fork isn't vulnerable to these?