SB2015011605 - Multiple vulnerabilities in MediaWiki
Published: January 16, 2015 Updated: April 10, 2021
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 7 secuirty vulnerabilities.
1) Input validation error (CVE-ID: CVE-2014-9487)
The vulnerability allows remote attackers to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can read arbitrary files, cause a denial of service, or possibly have other impact via an XML External Entity (XXE) attack.
2) Cross-site scripting (CVE-ID: CVE-2014-9480)
Vulnerability allows a remote attacker to perform XSS attacks.
The vulnerability is caused by an input validation error in the Hovercards extension for MediaWiki. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
3) Cross-site scripting (CVE-ID: CVE-2014-9479)
Vulnerability allows a remote attacker to perform XSS attacks.
The vulnerability is caused by an input validation error in the preview in the TemplateSandbox extension for MediaWiki when processing text parameter to Special:TemplateSandbox. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
4) Cross-site scripting (CVE-ID: CVE-2014-9478)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in the preview in the ExpandTemplates extension for MediaWiki, when $wgRawHTML is set to true,. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
5) Cross-site scripting (CVE-ID: CVE-2014-9477)
Vulnerability allows a remote attacker to perform Cross-site scripting attacks.
An input validation error exists in the Listings extension for MediaWiki when processing the (1) name or (2) url parameter. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
6) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2014-9476)
The vulnerability allows a remote non-authenticated attacker to manipulate data.
MediaWiki 1.2x before 1.22.15, 1.23.x before 1.23.8, and 1.24.x before 1.24.1 allows remote attackers to bypass CORS restrictions in $wgCrossSiteAJAXdomains via a domain that has a partial match to an allowed origin, as demonstrated by "http://en.wikipedia.org.evilsite.example/."
7) Cross-site scripting (CVE-ID: CVE-2014-9475)
Vulnerability allows a remote attacker to perform XSS attacks.
The vulnerability is caused by an input validation error in thumb.php in MediaWiki before 1.19.23, 1.2x before 1.22.15, 1.23.x before 1.23.8, and 1.24.x before 1.24.1. A remote authenticated attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
Remediation
Install update from vendor's website.
References
- http://www.openwall.com/lists/oss-security/2015/01/03/13
- https://bugzilla.redhat.com/show_bug.cgi?id=1175828
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-December/000173.html
- https://security.gentoo.org/glsa/201502-04
- http://www.openwall.com/lists/oss-security/2014/12/21/2
- https://phabricator.wikimedia.org/T69180
- https://phabricator.wikimedia.org/T76195
- https://phabricator.wikimedia.org/T73111
- https://phabricator.wikimedia.org/T77624
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:006
- https://phabricator.wikimedia.org/T77028
- http://www.debian.org/security/2014/dsa-3110