SB2021042609 - Multiple vulnerabilities in MediaWiki



SB2021042609 - Multiple vulnerabilities in MediaWiki

Published: April 26, 2021

Security Bulletin ID SB2021042609
Severity
Medium
Patch available
YES
Number of vulnerabilities 13
Exploitation vector Remote access
Highest impact Information disclosure

Breakdown by Severity

Medium 69% Low 31%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 13 secuirty vulnerabilities.


1) Cross-site scripting (CVE-ID: CVE-2021-31550)

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data in the CommentBox extension. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


2) Exposure of Resource to Wrong Sphere (CVE-ID: CVE-2021-31548)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to exposure of resource to wrong sphere issue in the AbuseFilter extension. A remote authenticated attacker can bypass AbuseFilter and have their edits completed.


3) Information disclosure (CVE-ID: CVE-2021-31557)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application in the WikiLove extension. A remote attacker can gain unauthorized access to sensitive information on the system, such as existence of hidden users.


4) Cross-site scripting (CVE-ID: CVE-2021-31551)

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data in the PageForms extension. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


5) Information disclosure (CVE-ID: CVE-2021-31546)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application in the AbuseFilter extension. A remote attacker can gain unauthorized access to sensitive information on the system.


6) Exposure of Resource to Wrong Sphere (CVE-ID: CVE-2021-31547)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to exposure of resource to wrong sphere issue in the AbuseFilter extension. A remote authenticated attacker can reveal suppressed edits and usernames through the iteration of crafted AbuseFilter rules.


7) Information disclosure (CVE-ID: CVE-2021-31545)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists in the AbuseFilter extension due to the page_recent_contributors leaked the existence of certain deleted MediaWiki usernames, related to rev_deleted. A remote attacker can gain unauthorized access to sensitive information on the system.


8) Information disclosure (CVE-ID: CVE-2021-31549)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application in the AbuseFilter extension. A remote authenticated attacker can use the Special:AbuseFilter/examine form to disclose the suppressed MediaWiki usernames.


9) Unquoted Search Path or Element (CVE-ID: CVE-2021-31553)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to an unquoted search path issue in the CheckUser extension. A remote attacker can turn off Special:CheckUserLog and thus interfere with usage tracking.


10) Exposure of Resource to Wrong Sphere (CVE-ID: CVE-2021-31552)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to the affected software incorrectly executes certain rules related to blocking accounts after account creation in the AbuseFilter extension. A remote authenticated attacker can create user accounts or enumerate any number of IP addresses related to these account creations.


11) Exposure of Resource to Wrong Sphere (CVE-ID: CVE-2021-31554)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to the affected software improperly handles account blocks for certain automatically created MediaWiki user accounts in the AbuseFilter extension. A remote authenticated attacker can remain unblocked.


12) Input validation error (CVE-ID: CVE-2021-31556)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to the affected software does not validate the oarc_version (aka oauth_registered_consumer.oarc_version) parameter's length in the Oauth extension.


13) Input validation error (CVE-ID: CVE-2021-31555)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to the affected software does not validate the oarc_version (aka oauth_registered_consumer.oarc_version) parameter's length in the Oauth extension.


Remediation

Install update from vendor's website.

References