![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.1.10.2014.0113 |
Category: | Mageia Linux Local Security Checks |
Title: | Mageia: Security Advisory (MGASA-2014-0113) |
Summary: | The remote host is missing an update for the 'mediawiki, mediawiki-ldapauthentication, mediawiki-math' package(s) announced via the MGASA-2014-0113 advisory. |
Description: | Summary: The remote host is missing an update for the 'mediawiki, mediawiki-ldapauthentication, mediawiki-math' package(s) announced via the MGASA-2014-0113 advisory. Vulnerability Insight: MediaWiki user Michael M reported that the fix for CVE-2013-4568 allowed insertion of escaped CSS values which could pass the CSS validation checks, resulting in XSS (CVE-2013-6451). Chris from RationalWiki reported that SVG files could be uploaded that include external stylesheets, which could lead to XSS when an XSL was used to include JavaScript (CVE-2013-6452). During internal review, it was discovered that MediaWiki's SVG sanitization could be bypassed when the XML was considered invalid (CVE-2013-6453). During internal review, it was discovered that MediaWiki displayed some information about deleted pages in the log API, enhanced RecentChanges, and user watchlists (CVE-2013-6472). Netanel Rubin from Check Point discovered a remote code execution vulnerability in MediaWiki's thumbnail generation for DjVu files. Internal review also discovered similar logic in the PdfHandler extension, which could be exploited in a similar way (CVE-2014-1610). MediaWiki has been updated to version 1.22.2, which fixes these issues, as well as several others. Also, the mediawiki-ldapauthentication and mediawiki-math extensions have been updated to newer versions that are compatible with MediaWiki 1.22. Additionally, the mediawiki-graphviz extension has been obsoleted, due to the fact that it is unmaintained upstream and is vulnerable to cross-site scripting attacks. Note: if you were using the 'instances' feature in these packages to support multiple wiki instances, this feature has now been removed. You will need to maintain separate wiki instances manually. Affected Software/OS: 'mediawiki, mediawiki-ldapauthentication, mediawiki-math' package(s) on Mageia 3, Mageia 4. Solution: Please install the updated package(s). CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2013-6451 http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000138.html Common Vulnerability Exposure (CVE) ID: CVE-2013-6452 Common Vulnerability Exposure (CVE) ID: CVE-2013-6453 Common Vulnerability Exposure (CVE) ID: CVE-2013-6472 Common Vulnerability Exposure (CVE) ID: CVE-2014-1610 BugTraq ID: 65223 http://www.securityfocus.com/bid/65223 Debian Security Information: DSA-2891 (Google Search) http://www.debian.org/security/2014/dsa-2891 http://www.exploit-db.com/exploits/31329/ http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127948.html http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127942.html http://www.checkpoint.com/defense/advisories/public/2014/cpai-26-jan.html http://www.checkpoint.com/threatcloud-central/articles/2014-01-28-tc-researchers-discover.html https://bugzilla.wikimedia.org/attachment.cgi?id=14361&action=diff https://bugzilla.wikimedia.org/attachment.cgi?id=14384&action=diff https://gerrit.wikimedia.org/r/#/c/110069/ https://gerrit.wikimedia.org/r/#/c/110069/2/includes/media/Bitmap.php https://gerrit.wikimedia.org/r/#/c/110215/ http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000140.html http://osvdb.org/102630 http://www.osvdb.org/102631 http://www.securitytracker.com/id/1029707 http://secunia.com/advisories/56695 http://secunia.com/advisories/57472 |
Copyright | Copyright (C) 2022 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |