MediaWiki Multiple Vulnerabilities Fixed by 1.26.1, 1.25.4, 1.24.5 and 1.23.12


Description   (#Several vulnerabilities have been identified in MediaWiki:#- CVE-2015-8622: cross-site scripting within wikitext when the variable "wgArticlePath" is set to $1.#- CVE-2015-8623: timing attack due to the tokens comparison type within "User::matchEditToken"#- CVE-2015-8624: timing attack due to the tokens comparison type within "User::matchEditToken"#- CVE-2015-8625: arbitrary file upload when the curl library is passed a variable starting with '@'#- CVE-2015-8626: security bypass due to weak password generation via the "User::randomPassword()" function#- CVE-2015-8627: denial of service due to block of certain IP ranges when padding has to be used#- CVE-2015-8628: information leak during a series of redirection from the Special:MyPage page allowing a user login to be revealed.##The mediawiki packages provided for Debian squeeze 6, Wheezy 7 and Jessie 8 are vulnerable.#Updated, 06/06/2016:#Contrarily to the statement above, the mediawiki packages provided by Debian Jessie 8 are not vulnerable.)
     
Vulnerable Products   Vulnerable OS:
Fedora (Red Hat) - 22, 23FreeBSD (FreeBSD) - AllGNU/Linux (Debian) - 6, 7, 8Vulnerable Software:
MediaWiki (Wikimedia Foundation) - 1.10.0, 1.10.1, 1.10.2, 1.10.3, 1.10.4, ..., 1.9.2, 1.9.3, 1.9.4, 1.9.5, 1.9.6
     
Solution   Fixed mediawiki packages for Fedora 22 are available.
     
CVE   CVE-2015-8628
CVE-2015-8627
CVE-2015-8626
CVE-2015-8625
CVE-2015-8624
CVE-2015-8623
CVE-2015-8622
     
References   - Security Release: 1.26.1, 1.25.4, 1.24.5 and 1.23.12
https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-December/000186.html
- DST mediawiki: CVE-2015-8622
https://security-tracker.debian.org/tracker/CVE-2015-8622
- DST mediawiki: CVE-2015-8623
https://security-tracker.debian.org/tracker/CVE-2015-8623
- DST mediawiki: CVE-2015-8624
https://security-tracker.debian.org/tracker/CVE-2015-8624
- DST mediawiki: CVE-2015-8625
https://security-tracker.debian.org/tracker/CVE-2015-8625
- DST mediawiki: CVE-2015-8626
https://security-tracker.debian.org/tracker/CVE-2015-8626
- DST mediawiki: CVE-2015-8627
https://security-tracker.debian.org/tracker/CVE-2015-8627
- DST mediawiki: CVE-2015-8628
https://security-tracker.debian.org/tracker/CVE-2015-8628
- FreeBSD: mediawiki -- multiple vulnerabilities
http://www.vuxml.org/freebsd/f36bbd66-aa44-11e5-8f5c-002590263bf5.html
- FEDORA-2015-5567 : Fedora 23 Update: mediawiki-1.26.2-1.fc23
https://lists.fedoraproject.org/pipermail/package-announce/2016-January/174806.html
- FEDORA-2015-56543978e8 : Fedora 22 Update: mediawiki-1.26.2-1.fc22
https://lists.fedoraproject.org/pipermail/package-announce/2016-January/175211.html
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
XSS - Prevention - POST : suspicious 'meta' tag found in data
3.2.0
XSS - Prevention - POST : suspicious 'img' attribute found in data
3.2.0
XSS - Prevention - POST : suspicious 'style' tag found in data
5.0.0
XSS - Prevention - POST : javascript code found in data
5.0.0
XSS - Prevention - POST : suspicious tag with event found in data
5.0.0
XSS - Prevention - POST : suspicious 'embed' tag found in data
5.0.0
XSS - Prevention - POST : 'location' javascript object found in data
5.0.0
XSS - Prevention - POST : code allowing cookie access found in data
5.0.0
XSS - Prevention - POST : 'script' tag found in data
5.0.0
XSS - Prevention - POST : suspicious 'style' attribute found in data
5.0.0
XSS - Prevention - POST : suspicious 'applet' tag found in data
5.0.0
XSS - Prevention - POST : suspicious 'div' tag found in data
5.0.0
XSS - Prevention - POST : suspicious 'img' attribute found in data
5.0.0
XSS - Prevention - POST : suspicious 'meta' tag found in data
5.0.0
XSS - Prevention - POST : suspicious 'object' tag found in data
5.0.0
XSS - Prevention - POST : suspicious 'iframe' tag found in data
5.0.0
     


 
 
 
 
 Risk level 
Moderate 

 Vulnerability First Public Report Date 
2015-12-18 

 Target Type 
Server 

 Possible exploit 
Remote