Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.108111
Category:Web application abuses
Title:MediaWiki Multiple Vulnerabilities (Dec 2015) - Linux
Summary:MediaWiki is prone to multiple vulnerabilities.
Description:Summary:
MediaWiki is prone to multiple vulnerabilities.

Vulnerability Insight:
Multiple flaws exist due to:

- the (1) Special:MyPage, (2) Special:MyTalk, (3) Special:MyContributions, (4) Special:MyUploads, and (5) Special:AllMyUploads pages
allow remote attackers to obtain sensitive user login information via crafted links combined with page view statistics.

- not properly normalized IP addresses containing zero-padded octets, which might allow remote attackers to bypass intended access
restrictions by using an IP address that was not supposed to have been allowed.

- the User::randomPassword function generates passwords smaller than $wgMinimalPasswordLength, which makes it easier for remote
attackers to obtain access via a brute-force attack.

- not properly sanitized parameters when calling the cURL library, which allows remote attackers to read arbitrary files via an
@ (at sign) character in unspecified POST array parameters.

- the User::matchEditToken function in includes/User.php does not perform token comparison in constant time before determining if
a debugging message should be logged, which allows remote attackers to guess the edit token and bypass CSRF protection via a timing attack,
a different vulnerability than CVE-2015-8623.

- the User::matchEditToken function in includes/User.php does not perform token comparison in constant time before returning, which
allows remote attackers to guess the edit token and bypass CSRF protection via a timing attack, a different vulnerability than CVE-2015-8624.

- Cross-site scripting (XSS) vulnerability, when is configured with a relative URL, allows remote authenticated users to inject arbitrary web
script or HTML via wikitext, as demonstrated by a wikilink to a page named javascript:alert('XSS!').

Vulnerability Impact:
Successful exploitation will allow remote attackers to conduct XSS attacks, gain access to sensitive information and
have other some unspecified impact.

Affected Software/OS:
MediaWiki before 1.23.12, 1.24.x before 1.24.5, 1.25.x before 1.25.4, and 1.26.x before 1.26.1

Solution:
Upgrade to version 1.23.12 or 1.24.5
or 1.25.4 or 1.26.1 or later.

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2015-8622
https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-December/000186.html
http://www.openwall.com/lists/oss-security/2015/12/21/8
http://www.openwall.com/lists/oss-security/2015/12/23/7
Common Vulnerability Exposure (CVE) ID: CVE-2015-8623
Common Vulnerability Exposure (CVE) ID: CVE-2015-8624
Common Vulnerability Exposure (CVE) ID: CVE-2015-8625
Common Vulnerability Exposure (CVE) ID: CVE-2015-8626
Common Vulnerability Exposure (CVE) ID: CVE-2015-8627
Common Vulnerability Exposure (CVE) ID: CVE-2015-8628
CopyrightCopyright (C) 2017 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.