MediaWiki < 1.19.16 / 1.21.10 / 1.22.7 'Special:PasswordReset' XSS

low Nessus Plugin ID 76148

Synopsis

The remote web server contains an application that is affected by a cross-site scripting vulnerability.

Description

According to its version number, the instance of MediaWiki running on the remote host is affected by a cross-site scripting vulnerability.
An input-validation flaw exists related to 'Special:PasswordReset'.
This allows a remote attacker to execute arbitrary code within the server and browser trust relationship.

Nessus has not tested for this issue but has instead relied on the application's self-reported version number.

Solution

Upgrade to MediaWiki version 1.19.16 / 1.22.7 or later.

Note that, although version 1.21.10 also addresses the vulnerability, the 1.21.x release branch was obsoleted in June 2014.

See Also

http://www.nessus.org/u?ff8509a9

https://phabricator.wikimedia.org/T67501

https://www.mediawiki.org/wiki/Release_notes/1.19

https://www.mediawiki.org/wiki/Release_notes/1.21

https://www.mediawiki.org/wiki/Release_notes/1.22

Plugin Details

Severity: Low

ID: 76148

File Name: mediawiki_1_21_10.nasl

Version: 1.10

Type: remote

Published: 6/19/2014

Updated: 6/5/2024

Configuration: Enable paranoid mode, Enable thorough checks

Supported Sensors: Nessus

Enable CGI Scanning: true

Risk Information

VPR

Risk Factor: Low

Score: 3.0

CVSS v2

Risk Factor: Low

Base Score: 2.6

Temporal Score: 2.3

Vector: CVSS2#AV:N/AC:H/Au:N/C:N/I:P/A:N

CVSS Score Source: CVE-2014-3966

Vulnerability Information

CPE: cpe:/a:mediawiki:mediawiki

Required KB Items: www/PHP, Settings/ParanoidReport, installed_sw/MediaWiki

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Patch Publication Date: 5/29/2014

Vulnerability Publication Date: 5/29/2014

Reference Information

CVE: CVE-2014-3966

BID: 67787

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990