#VU37968 Input validation error in MediaWiki and Debian Linux - CVE-2017-8811


| Updated: 2020-08-08

Vulnerability identifier: #VU37968

Vulnerability risk: Medium

CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2017-8811

CWE-ID: CWE-20

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
MediaWiki
Web applications / CMS
Debian Linux
Operating systems & Components / Operating system

Vendor: MediaWiki.org
Debian

Description

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

The implementation of raw message parameter expansion in MediaWiki before 1.27.4, 1.28.x before 1.28.3, and 1.29.x before 1.29.2 allows HTML mangling attacks.

Mitigation
Install update from vendor's website.

Vulnerable software versions

MediaWiki: 1.28.0 - 1.29.1

Debian Linux: 1.28.0 - 9.0


External links
https://www.securitytracker.com/id/1039812
https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-November/000216.html
https://www.debian.org/security/2017/dsa-4036


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability