SB2019071035 - Multiple vulnerabilities in MediaWiki MediaWiki
Published: July 10, 2019 Updated: July 17, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 7 secuirty vulnerabilities.
1) Improper access control (CVE-ID: CVE-2019-12469)
The vulnerability allows a remote attacker to gain unauthorized access to sensitive information.
The vulnerability exists due to improper access restrictions. A remote attacker can send a specially crafted request and gain unauthorized access to the affected application.
2) Improper access control (CVE-ID: CVE-2019-12470)
The vulnerability allows a remote attacker to gain unauthorized access to sensitive information.
The vulnerability exists due to improper access restrictions. A remote attacker can send a specially crafted request and gain unauthorized access to the affected application.
3) Cross-site scripting (CVE-ID: CVE-2019-12471)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Wikimedia MediaWiki 1.30.0 through 1.32.1 has XSS. Loading user JavaScript from a non-existent account allows anyone to create the account, and perform XSS on users loading that script. Fixed in 1.32.2, 1.31.2, 1.30.2 and 1.27.6.
4) Improper access control (CVE-ID: CVE-2019-12472)
The vulnerability allows a remote non-authenticated attacker to manipulate data.
An Incorrect Access Control vulnerability was found in Wikimedia MediaWiki 1.18.0 through 1.32.1. It is possible to bypass the limits on IP range blocks ($wgBlockCIDRLimit) by using the API. Fixed in 1.32.2, 1.31.2, 1.30.2 and 1.27.6.
5) Input validation error (CVE-ID: CVE-2019-12473)
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
Wikimedia MediaWiki 1.27.0 through 1.32.1 might allow DoS. Passing invalid titles to the API could cause a DoS by querying the entire watchlist table. Fixed in 1.32.2, 1.31.2, 1.30.2 and 1.27.6.
6) Information disclosure (CVE-ID: CVE-2019-12474)
The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
Wikimedia MediaWiki 1.23.0 through 1.32.1 has an information leak. Privileged API responses that include whether a recent change has been patrolled may be cached publicly. Fixed in 1.32.2, 1.31.2, 1.30.2 and 1.27.6.
7) Improper access control (CVE-ID: CVE-2019-12467)
The vulnerability allows a remote attacker to gain unauthorized access to sensitive information.
The vulnerability exists due to improper access restrictions. A remote attacker can send a specially crafted request and gain unauthorized access to the affected application.
Remediation
Install update from vendor's website.
References
- https://lists.wikimedia.org/pipermail/wikitech-l/2019-June/092152.html
- https://phabricator.wikimedia.org/T222036
- https://seclists.org/bugtraq/2019/Jun/12
- https://www.debian.org/security/2019/dsa-4460
- https://phabricator.wikimedia.org/T222038
- https://phabricator.wikimedia.org/T207603
- https://phabricator.wikimedia.org/T199540
- https://phabricator.wikimedia.org/T204729
- https://phabricator.wikimedia.org/T212118
- https://phabricator.wikimedia.org/T209794