Debian DSA-2366-1 : mediawiki - multiple vulnerabilities

Medium Nessus Plugin ID 57506

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 3.4

Synopsis

The remote Debian host is missing a security-related update.

Description

Several problems have been discovered in MediaWiki, a website engine for collaborative work.

- CVE-2011-1578 CVE-2011-1587 Masato Kinugawa discovered a cross-site scripting (XSS) issue, which affects Internet Explorer clients only, and only version 6 and earlier. Web server configuration changes are required to fix this issue. Upgrading MediaWiki will only be sufficient for people who use Apache with AllowOverride enabled.

For details of the required configuration changes, see the upstream announcements.

- CVE-2011-1579 Wikipedia user Suffusion of Yellow discovered a CSS validation error in the wikitext parser. This is an XSS issue for Internet Explorer clients, and a privacy loss issue for other clients since it allows the embedding of arbitrary remote images.

- CVE-2011-1580 MediaWiki developer Happy-Melon discovered that the transwiki import feature neglected to perform access control checks on form submission. The transwiki import feature is disabled by default. If it is enabled, it allows wiki pages to be copied from a remote wiki listed in $wgImportSources. The issue means that any user can trigger such an import to occur.

- CVE-2011-4360 Alexandre Emsenhuber discovered an issue where page titles on private wikis could be exposed bypassing different page ids to index.php. In the case of the user not having correct permissions, they will now be redirected to Special:BadTitle.

- CVE-2011-4361 Tim Starling discovered that action=ajax requests were dispatched to the relevant function without any read permission checks being done. This could have led to data leakage on private wikis.

Solution

Upgrade the mediawiki packages.

For the oldstable distribution (lenny), these problems have been fixed in version 1:1.12.0-2lenny9.

For the stable distribution (squeeze), these problems have been fixed in version 1:1.15.5-2squeeze2.

See Also

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=650434

https://security-tracker.debian.org/tracker/CVE-2011-1578

https://security-tracker.debian.org/tracker/CVE-2011-1587

http://www.nessus.org/u?fd0ac87d

http://www.nessus.org/u?dd33820b

https://security-tracker.debian.org/tracker/CVE-2011-1579

https://security-tracker.debian.org/tracker/CVE-2011-1580

https://security-tracker.debian.org/tracker/CVE-2011-4360

https://security-tracker.debian.org/tracker/CVE-2011-4361

https://packages.debian.org/source/squeeze/mediawiki

https://www.debian.org/security/2011/dsa-2366

Plugin Details

Severity: Medium

ID: 57506

File Name: debian_DSA-2366.nasl

Version: 1.12

Type: local

Agent: unix

Published: 2012/01/12

Updated: 2020/03/12

Dependencies: 12634

Risk Information

Risk Factor: Medium

VPR Score: 3.4

CVSS v2.0

Base Score: 5.8

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:mediawiki, cpe:/o:debian:debian_linux:5.0, cpe:/o:debian:debian_linux:6.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2011/12/18

Reference Information

CVE: CVE-2011-1578, CVE-2011-1579, CVE-2011-1580, CVE-2011-1587, CVE-2011-4360, CVE-2011-4361

BID: 47354, 50844

DSA: 2366