Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.108113
Category:Web application abuses
Title:MediaWiki Multiple Vulnerabilities (Mar 2015) - Windows
Summary:MediaWiki is prone to multiple vulnerabilities.
Description:Summary:
MediaWiki is prone to multiple vulnerabilities.

Vulnerability Insight:
Multiple flaws exist due to:

- incomplete blacklist vulnerability in includes/upload/UploadBase.php allows remote attackers to inject arbitrary web
script or HTML via an application/xml MIME type for a nested SVG with a data: URI.

- incomplete blacklist vulnerability allows remote attackers to inject arbitrary web script or HTML via an animated href XLink element.

- MediaWiki does not properly handle when the Zend interpreter xml_parse function does not expand entities, which allows remote attackers
to inject arbitrary web script or HTML via a crafted SVG file.

- bypassing the SVG filtering and obtain sensitive user information via a mixed case @import in a style element in an SVG file.

- when using HHVM or Zend PHP, allows remote attackers to cause a denial of service ('quadratic blowup' and memory consumption) via an XML file containing an
entity declaration with long replacement text and many references to this entity, a different vulnerability than CVE-2015-2942.

- Cross-site scripting (XSS) vulnerability allowing remote attackers to inject arbitrary web script or HTML via a custom JavaScript file, which is not properly
handled when previewing the file.

- Cross-site scripting (XSS) vulnerability, when using HHVM, allows remote attackers to inject arbitrary web script or HTML via an invalid parameter in a wddx
format request to api.php, which is not properly handled in an error message, related to unsafe calls to wddx_serialize_value.

- when using HHVM, allows remote attackers to cause a denial of service (CPU and memory consumption) via a large number of nested entity references in an (1) SVG
file or (2) XMP metadata in a PDF file, aka a 'billion laughs attack', a different vulnerability than CVE-2015-2937.

Vulnerability Impact:
Successful exploitation will allow remote attackers to conduct XSS attacks, gain access to sensitive information and
have other some unspecified impact.

Affected Software/OS:
MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2

Solution:
Upgrade to version 1.19.24 or 1.23.9
or 1.24.2 or later.

CVSS Score:
7.1

CVSS Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2015-2931
BugTraq ID: 73477
http://www.securityfocus.com/bid/73477
https://security.gentoo.org/glsa/201510-05
http://www.mandriva.com/security/advisories?name=MDVSA-2015:200
https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html
http://www.openwall.com/lists/oss-security/2015/04/01/1
http://www.openwall.com/lists/oss-security/2015/04/07/3
Common Vulnerability Exposure (CVE) ID: CVE-2015-2932
Common Vulnerability Exposure (CVE) ID: CVE-2015-2933
Common Vulnerability Exposure (CVE) ID: CVE-2015-2934
Common Vulnerability Exposure (CVE) ID: CVE-2015-2935
Common Vulnerability Exposure (CVE) ID: CVE-2015-2936
Common Vulnerability Exposure (CVE) ID: CVE-2015-2937
Common Vulnerability Exposure (CVE) ID: CVE-2015-2938
Common Vulnerability Exposure (CVE) ID: CVE-2015-2941
Common Vulnerability Exposure (CVE) ID: CVE-2015-2942
CopyrightCopyright (C) 2017 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.