CVE-2023-36674

An issue was discovered in MediaWiki before 1.35.11, 1.36.x through 1.38.x before 1.38.7, 1.39.x before 1.39.4, and 1.40.x before 1.40.1. It is possible to bypass the Bad image list (aka badFile) by using the thumb parameter (aka Manualthumb) of the File syntax.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
mitreCNA
---
---
CVEADP
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 12%
VendorProductVersion
mediawikimediawiki
𝑥
< 1.35.11
mediawikimediawiki
1.36.0 ≤
𝑥
< 1.38.7
mediawikimediawiki
1.39.0 ≤
𝑥
< 1.39.4
mediawikimediawiki
1.40.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
mediawiki
bullseye
1:1.35.13-1+deb11u2
fixed
buster
not-affected
bullseye (security)
1:1.35.13-1+deb11u3
fixed
bookworm
1:1.39.10-1~deb12u1
fixed
bookworm (security)
1:1.39.10-1~deb12u1
fixed
sid
1:1.39.10-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
mediawiki
oracular
not-affected
noble
not-affected
mantic
not-affected
lunar
ignored
kinetic
ignored
jammy
needs-triage
focal
needs-triage
bionic
needs-triage
xenial
ignored
trusty
ignored