Lucene search

K
gentooGentoo FoundationGLSA-200502-33
HistoryFeb 28, 2005 - 12:00 a.m.

MediaWiki: Multiple vulnerabilities

2005-02-2800:00:00
Gentoo Foundation
security.gentoo.org
12

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.01

Percentile

83.6%

Background

MediaWiki is a collaborative editing software, used by big projects like Wikipedia.

Description

A security audit of the MediaWiki project discovered that MediaWiki is vulnerable to several cross-site scripting and cross-site request forgery attacks, and that the image deletion code does not sufficiently sanitize input parameters.

Impact

By tricking a user to load a carefully crafted URL, a remote attacker could hijack sessions and authentication cookies to inject malicious script code that will be executed in a user’s browser session in context of the vulnerable site, or use JavaScript submitted forms to perform restricted actions. Using the image deletion flaw, it is also possible for authenticated administrators to delete arbitrary files via directory traversal.

Workaround

There is no known workaround at this time.

Resolution

All MediaWiki users should upgrade to the latest available version:

 # emerge --sync 
 # emerge --ask --oneshot --verbose ">=www-apps/mediawiki-1.3.11"
OSVersionArchitecturePackageVersionFilename
Gentooanyallwww-apps/mediawiki< 1.3.11UNKNOWN

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.01

Percentile

83.6%