Debian DSA-2366-1 : mediawiki - multiple vulnerabilities

medium Nessus Plugin ID 57506

Synopsis

The remote Debian host is missing a security-related update.

Description

Several problems have been discovered in MediaWiki, a website engine for collaborative work.

- CVE-2011-1578 CVE-2011-1587 Masato Kinugawa discovered a cross-site scripting (XSS) issue, which affects Internet Explorer clients only, and only version 6 and earlier. Web server configuration changes are required to fix this issue. Upgrading MediaWiki will only be sufficient for people who use Apache with AllowOverride enabled.

For details of the required configuration changes, see the upstream announcements.

- CVE-2011-1579 Wikipedia user Suffusion of Yellow discovered a CSS validation error in the wikitext parser. This is an XSS issue for Internet Explorer clients, and a privacy loss issue for other clients since it allows the embedding of arbitrary remote images.

- CVE-2011-1580 MediaWiki developer Happy-Melon discovered that the transwiki import feature neglected to perform access control checks on form submission. The transwiki import feature is disabled by default. If it is enabled, it allows wiki pages to be copied from a remote wiki listed in $wgImportSources. The issue means that any user can trigger such an import to occur.

- CVE-2011-4360 Alexandre Emsenhuber discovered an issue where page titles on private wikis could be exposed bypassing different page ids to index.php. In the case of the user not having correct permissions, they will now be redirected to Special:BadTitle.

- CVE-2011-4361 Tim Starling discovered that action=ajax requests were dispatched to the relevant function without any read permission checks being done. This could have led to data leakage on private wikis.

Solution

Upgrade the mediawiki packages.

For the oldstable distribution (lenny), these problems have been fixed in version 1:1.12.0-2lenny9.

For the stable distribution (squeeze), these problems have been fixed in version 1:1.15.5-2squeeze2.

See Also

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=650434

https://security-tracker.debian.org/tracker/CVE-2011-1578

https://security-tracker.debian.org/tracker/CVE-2011-1587

http://www.nessus.org/u?fd0ac87d

http://www.nessus.org/u?dd33820b

https://security-tracker.debian.org/tracker/CVE-2011-1579

https://security-tracker.debian.org/tracker/CVE-2011-1580

https://security-tracker.debian.org/tracker/CVE-2011-4360

https://security-tracker.debian.org/tracker/CVE-2011-4361

https://packages.debian.org/source/squeeze/mediawiki

https://www.debian.org/security/2011/dsa-2366

Plugin Details

Severity: Medium

ID: 57506

File Name: debian_DSA-2366.nasl

Version: 1.13

Type: local

Agent: unix

Published: 1/12/2012

Updated: 1/11/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: Medium

Base Score: 5.8

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N

Vulnerability Information

CPE: cpe:/o:debian:debian_linux:6.0, cpe:/o:debian:debian_linux:5.0, p-cpe:/a:debian:debian_linux:mediawiki

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 12/18/2011

Reference Information

CVE: CVE-2011-1578, CVE-2011-1579, CVE-2011-1580, CVE-2011-1587, CVE-2011-4360, CVE-2011-4361

BID: 47354, 50844

DSA: 2366