Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.10.2014.0113
Category:Mageia Linux Local Security Checks
Title:Mageia: Security Advisory (MGASA-2014-0113)
Summary:The remote host is missing an update for the 'mediawiki, mediawiki-ldapauthentication, mediawiki-math' package(s) announced via the MGASA-2014-0113 advisory.
Description:Summary:
The remote host is missing an update for the 'mediawiki, mediawiki-ldapauthentication, mediawiki-math' package(s) announced via the MGASA-2014-0113 advisory.

Vulnerability Insight:
MediaWiki user Michael M reported that the fix for CVE-2013-4568 allowed
insertion of escaped CSS values which could pass the CSS validation checks,
resulting in XSS (CVE-2013-6451).

Chris from RationalWiki reported that SVG files could be uploaded that
include external stylesheets, which could lead to XSS when an XSL was used
to include JavaScript (CVE-2013-6452).

During internal review, it was discovered that MediaWiki's SVG sanitization
could be bypassed when the XML was considered invalid (CVE-2013-6453).

During internal review, it was discovered that MediaWiki displayed some
information about deleted pages in the log API, enhanced RecentChanges, and
user watchlists (CVE-2013-6472).

Netanel Rubin from Check Point discovered a remote code execution
vulnerability in MediaWiki's thumbnail generation for DjVu files. Internal
review also discovered similar logic in the PdfHandler extension, which
could be exploited in a similar way (CVE-2014-1610).

MediaWiki has been updated to version 1.22.2, which fixes these issues, as
well as several others.

Also, the mediawiki-ldapauthentication and mediawiki-math extensions have
been updated to newer versions that are compatible with MediaWiki 1.22.

Additionally, the mediawiki-graphviz extension has been obsoleted, due to
the fact that it is unmaintained upstream and is vulnerable to cross-site
scripting attacks.

Note: if you were using the 'instances' feature in these packages to
support multiple wiki instances, this feature has now been removed. You
will need to maintain separate wiki instances manually.

Affected Software/OS:
'mediawiki, mediawiki-ldapauthentication, mediawiki-math' package(s) on Mageia 3, Mageia 4.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2013-6451
http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000138.html
Common Vulnerability Exposure (CVE) ID: CVE-2013-6452
Common Vulnerability Exposure (CVE) ID: CVE-2013-6453
Common Vulnerability Exposure (CVE) ID: CVE-2013-6472
Common Vulnerability Exposure (CVE) ID: CVE-2014-1610
BugTraq ID: 65223
http://www.securityfocus.com/bid/65223
Debian Security Information: DSA-2891 (Google Search)
http://www.debian.org/security/2014/dsa-2891
http://www.exploit-db.com/exploits/31329/
http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127948.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127942.html
http://www.checkpoint.com/defense/advisories/public/2014/cpai-26-jan.html
http://www.checkpoint.com/threatcloud-central/articles/2014-01-28-tc-researchers-discover.html
https://bugzilla.wikimedia.org/attachment.cgi?id=14361&action=diff
https://bugzilla.wikimedia.org/attachment.cgi?id=14384&action=diff
https://gerrit.wikimedia.org/r/#/c/110069/
https://gerrit.wikimedia.org/r/#/c/110069/2/includes/media/Bitmap.php
https://gerrit.wikimedia.org/r/#/c/110215/
http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000140.html
http://osvdb.org/102630
http://www.osvdb.org/102631
http://www.securitytracker.com/id/1029707
http://secunia.com/advisories/56695
http://secunia.com/advisories/57472
CopyrightCopyright (C) 2022 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.