MGASA-2015-0486

Source
https://advisories.mageia.org/MGASA-2015-0486.html
Import Source
https://advisories.mageia.org/MGASA-2015-0486.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2015-0486
Related
Published
2015-12-24T11:08:20Z
Modified
2015-12-24T11:03:03Z
Summary
Updated mediawiki packages fix security vulnerabilities
Details

Updated mediawiki packages fix security vulnerabilities:

In MediaWiki before 1.23.12, an XSS vector exists when MediaWiki is configured with a non-standard configuration, from wikitext when $wgArticlePath='$1' (CVE-2015-8622).

In MediaWiki before 1.23.12, tokens were being compared as strings, which could allow a timing attack (CVE-2015-8623, CVE-2015-8624).

In MediaWiki before 1.23.12, parameters passed to the curl library were not sanitized, which could cause curl to upload files from the webserver to an attacker when POST variable starts with '@' (CVE-2015-8625).

In MediaWiki before 1.23.12, the password reset token could be shorter than the minimum required password length (CVE-2015-8626).

In MediaWiki before 1.23.12, blocking IP addresses with zero-padded octets resulted in a failure to block the IP address (CVE-2015-8627).

In MediaWiki before 1.23.12, a combination of Special:MyPage redirects and pagecounts allows an external site to know the wikipedia login of an user (CVE-2015-8628).

References
Credits

Affected packages

Mageia:5 / mediawiki

Package

Name
mediawiki
Purl
pkg:rpm/mageia/mediawiki?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.23.12-1.mga5

Ecosystem specific

{
    "section": "core"
}