MediaWiki profileinfo.php 'filter' Parameter XSS

This script is Copyright (C) 2010-2015 Tenable Network Security, Inc.


Synopsis :

A web application running on the remote host is affected by a
cross-site scripting vulnerability.

Description :

The version of MediaWiki running on the remote host is affected by a
cross-site scripting vulnerability due to improper validation of
user-supplied input to the 'filter' parameter in the 'profileinfo.php'
script. A remote attacker can exploit this, by tricking a user into
requesting a maliciously crafted URL, to execute arbitrary script code
in the security context of the affected application.

Installations that have the 'wgEnableProfileInfo' setting disabled
are not affected. This setting is disabled by default.

See also :

https://bugzilla.wikimedia.org/show_bug.cgi?id=24565
http://www.nessus.org/u?014eb0ca

Solution :

Upgrade to MediaWiki 1.15.5 / 1.16.0 or later.

Risk factor :

Low / CVSS Base Score : 2.6
(CVSS2#AV:N/AC:H/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 2.1
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: CGI abuses : XSS

Nessus Plugin ID: 47902 ()

Bugtraq ID: 42024

CVE ID: CVE-2010-2788

Ready to Scan Unlimited IPs & Run Compliance Checks?

Upgrade to Nessus Professional today!

Buy Now

Combine the Power of Nessus with the Ease of Cloud

Start your free Nessus Cloud trial now!

Begin Free Trial