Summary: | <www-apps/mediawiki-1.16.5: Multiple vulnerabilities (CVE-2010-{2787,2788,2789},CVE-2011-{0003,0047,0537,1579,1580,1765,1766}) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Tim Sammut (RETIRED) <underling> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | alexanderyt, trapni, web-apps |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | B4 [glsa] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | |||
Bug Blocks: | 316701 |
Description
Tim Sammut (RETIRED)
2011-05-10 04:11:39 UTC
CVE-2011-1766 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1766): includes/User.php in MediaWiki before 1.16.5, when wgBlockDisablesLogin is enabled, does not clear certain cached data after verification of an auth token fails, which allows remote attackers to bypass authentication by creating crafted wikiUserID and wikiUserName cookies, or by leveraging an unattended workstation. CVE-2011-1580 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1580): The transwiki import functionality in MediaWiki before 1.16.3 does not properly check privileges, which allows remote authenticated users to perform imports from any wgImportSources wiki via a crafted POST request. CVE-2011-1579 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1579): The checkCss function in includes/Sanitizer.php in the wikitext parser in MediaWiki before 1.16.3 does not properly validate Cascading Style Sheets (CSS) token sequences, which allows remote attackers to conduct cross-site scripting (XSS) attacks or obtain sensitive information by using the \2f\2a and \2a\2f hex strings to surround CSS comments. CVE-2011-0537 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0537): Multiple directory traversal vulnerabilities in (1) languages/Language.php and (2) includes/StubObject.php in MediaWiki 1.8.0 and other versions before 1.16.2, when running on Windows and possibly Novell Netware, allow remote attackers to include and execute arbitrary local PHP files via vectors related to a crafted language file and the Language::factory function. CVE-2011-0047 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0047): Cross-site scripting (XSS) vulnerability in MediaWiki before 1.16.2 allows remote attackers to inject arbitrary web script or HTML via crafted Cascading Style Sheets (CSS) comments, aka "CSS injection vulnerability." CVE-2011-0003 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0003): MediaWiki before 1.16.1, when user or site JavaScript or CSS is enabled, allows remote attackers to conduct clickjacking attacks via unspecified vectors. Maintainer timed out. Arches, please test and mark stable: =www-apps/mediawiki-1.16.5 target KEYWORDS : "amd64 ppc sparc x86" amd64 ok x86 stable, thanks + 16 Sep 2011; Tony Vroon <chainsaw@gentoo.org> mediawiki-1.16.5.ebuild: + Marked stable on AMD64 based on arch testing by Agostino "ago" Sarubbo in + security bug #36685 filed by Tim Sammut. sparc stable ppc stable, last arch done Thanks all, adding glsa vote. Thanks, folks. GLSA Vote: no. CVE-2010-2789 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2789): PHP remote file inclusion vulnerability in MediaWikiParserTest.php in MediaWiki 1.16 beta, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via unspecified vectors. CVE-2010-2788 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2788): Cross-site scripting (XSS) vulnerability in profileinfo.php in MediaWiki before 1.15.5, when wgEnableProfileInfo is enabled, allows remote attackers to inject arbitrary web script or HTML via the filter parameter. CVE-2010-2787 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2787): api.php in MediaWiki before 1.15.5 does not prevent use of public caching headers for private data, which allows remote attackers to bypass intended access restrictions and obtain sensitive information by retrieving documents from an HTTP proxy cache that has been used by a victim. There will be a GLSA for all of this. This issue was resolved and addressed in GLSA 201206-09 at http://security.gentoo.org/glsa/glsa-201206-09.xml by GLSA coordinator Stefan Behte (craig). |