MediaWiki < 1.21.9 / 1.22.6 'InfoAction.php' XSS

medium Nessus Plugin ID 73804

Synopsis

The remote web server contains an application that is affected by a cross-site scripting vulnerability.

Description

According to its version number, the instance of MediaWiki running on the remote host is affected by a cross-site scripting vulnerability. A flaw exists with 'sortKey' in the 'InfoAction.php' script. This allows a remote attacker to execute arbitrary code within the server and browser trust relationship.

Nessus has not tested for this issue but has instead relied on the application's self-reported version number.

Solution

Upgrade to MediaWiki version 1.21.9 / 1.22.6 or later.

See Also

http://www.nessus.org/u?86d2377c

https://www.mediawiki.org/wiki/Release_notes/1.21

https://www.mediawiki.org/wiki/Release_notes/1.22

https://phabricator.wikimedia.org/T65251

Plugin Details

Severity: Medium

ID: 73804

File Name: mediawiki_1_21_9.nasl

Version: 1.10

Type: remote

Published: 5/1/2014

Updated: 6/5/2024

Configuration: Enable paranoid mode, Enable thorough checks

Supported Sensors: Nessus

Enable CGI Scanning: true

Risk Information

VPR

Risk Factor: Low

Score: 3.0

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: cpe:/a:mediawiki:mediawiki

Required KB Items: Settings/ParanoidReport, installed_sw/MediaWiki, www/PHP

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Patch Publication Date: 4/24/2014

Vulnerability Publication Date: 3/29/2014

Reference Information

CVE: CVE-2014-2853

BID: 67068

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990