Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2012-5391 CVE-2012-5395 |
CWE-ID | CWE-20 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
MediaWiki Web applications / CMS |
Vendor | MediaWiki.org |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU41591
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2012-5391
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Session fixation vulnerability in Special:UserLogin in MediaWiki before 1.18.6, 1.19.x before 1.19.3, and 1.20.x before 1.20.1 allows remote attackers to hijack web sessions via the session_id. Per: http://cwe.mitre.org/data/definitions/384.html "CWE-384: Session Fixation"
MitigationInstall update from vendor's website.
Vulnerable software versionsMediaWiki: 1.18 - 1.20
CPE2.3https://lists.fedoraproject.org/pipermail/package-announce/2013-February/098975.html
https://lists.fedoraproject.org/pipermail/package-announce/2013-March/100843.html
https://lists.fedoraproject.org/pipermail/package-announce/2013-March/100845.html
https://lists.wikimedia.org/pipermail/mediawiki-announce/2012-November/000122.html
https://bugzilla.wikimedia.org/show_bug.cgi?id=40995
https://exchange.xforce.ibmcloud.com/vulnerabilities/83008
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU41592
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2012-5395
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Session fixation vulnerability in the CentralAuth extension for MediaWiki before 1.18.6, 1.19.x before 1.19.3, and 1.20.x before 1.20.1 allows remote attackers to hijack web sessions via the centralauth_Session cookie. Per: http://cwe.mitre.org/data/definitions/384.html "CWE-384: Session Fixation"
MitigationInstall update from vendor's website.
Vulnerable software versionsMediaWiki: 1.18 - 1.20
CPE2.3https://lists.wikimedia.org/pipermail/mediawiki-announce/2012-November/000122.html
https://bugzilla.wikimedia.org/show_bug.cgi?id=40962
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.