FreeBSD : mediawiki -- multiple vulnerabilities (61b07d71-ce0e-11dd-a721-0030843d3802)

This script is Copyright (C) 2008-2016 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

The MediaWiki development team reports :

Certain unspecified input is not properly sanitised before being
returned to the user. This can be exploited to execute arbitrary HTML
and script code in a user's browser session in context of an affected
site.

Certain unspecified input related to uploads is not properly sanitised
before being used. This can be exploited to inject arbitrary HTML and
script code, which will be executed in a user's browser session in
context of an affected site when a malicious data is opened.
Successful exploitation may require that uploads are enabled and the
victim uses an Internet Explorer based browser.

Certain SVG scripts are not properly sanitised before being used. This
can be exploited to inject arbitrary HTML and script code, which will
be executed in a user's browser session in context of an affected site
when a malicious data is opened. Successful exploitation may require
that SVG uploads are enabled and the victim uses a browser supporting
SVG scripting.

The application allows users to perform certain actions via HTTP
requests without performing any validity checks to verify the
requests. This can be exploited to perform certain operations when a
logged in user visits a malicious site.

See also :

http://www.nessus.org/u?e09f44e9
http://www.nessus.org/u?3347f83e

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 5.8
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:P)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 35243 (freebsd_pkg_61b07d71ce0e11dda7210030843d3802.nasl)

Bugtraq ID:

CVE ID: CVE-2008-5249
CVE-2008-5250
CVE-2008-5252

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now