![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.108110 |
Category: | Web application abuses |
Title: | MediaWiki Multiple Vulnerabilities (Dec 2015) - Windows |
Summary: | MediaWiki is prone to multiple vulnerabilities. |
Description: | Summary: MediaWiki is prone to multiple vulnerabilities. Vulnerability Insight: Multiple flaws exist due to: - the (1) Special:MyPage, (2) Special:MyTalk, (3) Special:MyContributions, (4) Special:MyUploads, and (5) Special:AllMyUploads pages allow remote attackers to obtain sensitive user login information via crafted links combined with page view statistics. - not properly normalized IP addresses containing zero-padded octets, which might allow remote attackers to bypass intended access restrictions by using an IP address that was not supposed to have been allowed. - the User::randomPassword function generates passwords smaller than $wgMinimalPasswordLength, which makes it easier for remote attackers to obtain access via a brute-force attack. - not properly sanitized parameters when calling the cURL library, which allows remote attackers to read arbitrary files via an @ (at sign) character in unspecified POST array parameters. - the User::matchEditToken function in includes/User.php does not perform token comparison in constant time before determining if a debugging message should be logged, which allows remote attackers to guess the edit token and bypass CSRF protection via a timing attack, a different vulnerability than CVE-2015-8623. - the User::matchEditToken function in includes/User.php does not perform token comparison in constant time before returning, which allows remote attackers to guess the edit token and bypass CSRF protection via a timing attack, a different vulnerability than CVE-2015-8624. - Cross-site scripting (XSS) vulnerability, when is configured with a relative URL, allows remote authenticated users to inject arbitrary web script or HTML via wikitext, as demonstrated by a wikilink to a page named javascript:alert('XSS!'). Vulnerability Impact: Successful exploitation will allow remote attackers to conduct XSS attacks, gain access to sensitive information and have other some unspecified impact. Affected Software/OS: MediaWiki before 1.23.12, 1.24.x before 1.24.5, 1.25.x before 1.25.4, and 1.26.x before 1.26.1 Solution: Upgrade to version 1.23.12 or 1.24.5 or 1.25.4 or 1.26.1 or later. CVSS Score: 6.8 CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2015-8622 https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-December/000186.html http://www.openwall.com/lists/oss-security/2015/12/21/8 http://www.openwall.com/lists/oss-security/2015/12/23/7 Common Vulnerability Exposure (CVE) ID: CVE-2015-8623 Common Vulnerability Exposure (CVE) ID: CVE-2015-8624 Common Vulnerability Exposure (CVE) ID: CVE-2015-8625 Common Vulnerability Exposure (CVE) ID: CVE-2015-8626 Common Vulnerability Exposure (CVE) ID: CVE-2015-8627 Common Vulnerability Exposure (CVE) ID: CVE-2015-8628 |
Copyright | Copyright (C) 2017 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |