UBUNTU-CVE-2015-8625

Source
https://ubuntu.com/security/CVE-2015-8625
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2015/UBUNTU-CVE-2015-8625.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2015-8625
Upstream
  • CVE-2015-8625
Withdrawn
2025-07-18T16:43:19Z
Published
2017-03-23T20:59:00Z
Modified
2025-07-16T07:33:35.094442Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

MediaWiki before 1.23.12, 1.24.x before 1.24.5, 1.25.x before 1.25.4, and 1.26.x before 1.26.1 do not properly sanitize parameters when calling the cURL library, which allows remote attackers to read arbitrary files via an @ (at sign) character in unspecified POST array parameters.

References

Affected packages

Ubuntu:18.04:LTS / mediawiki

Package

Name
mediawiki
Purl
pkg:deb/ubuntu/mediawiki@1:1.27.4-3?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:1.27.4-3

Affected versions

1:1.*

1:1.27.3-1
1:1.27.4-1
1:1.27.4-2

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1:1.27.4-3",
            "binary_name": "mediawiki"
        },
        {
            "binary_version": "1:1.27.4-3",
            "binary_name": "mediawiki-classes"
        }
    ],
    "availability": "No subscription required"
}