[Pkg-mediawiki-devel] Bug#799096: mediawiki: CVE-2015-6727 CVE-2015-6728 CVE-2015-6729 CVE-2015-6730

Salvatore Bonaccorso carnil at debian.org
Tue Sep 15 20:10:48 UTC 2015


Source: mediawiki
Version: 1:1.19.5-1
Severity: important
Tags: security upstream

Hi,

the following vulnerabilities were published for mediawiki.

CVE-2015-6727[0]:
| The Special:DeletedContributions page in MediaWiki before 1.23.10,
| 1.24.x before 1.24.3, and 1.25.x before 1.25.2 allows remote attackers
| to determine if an IP is autoblocked via the "Change block" text.

CVE-2015-6728[1]:
| The ApiBase::getWatchlistUser function in MediaWiki before 1.23.10,
| 1.24.x before 1.24.3, and 1.25.x before 1.25.2 does not perform token
| comparison in constant time, which allows remote attackers to guess
| the watchlist token and bypass CSRF protection via a timing attack.

CVE-2015-6729[2]:
| Cross-site scripting (XSS) vulnerability in thumb.php in MediaWiki
| before 1.23.10, 1.24.x before 1.24.3, and 1.25.x before 1.25.2 allows
| remote attackers to inject arbitrary web script or HTML via the rel404
| parameter, which is not properly handled in an error page.

CVE-2015-6730[3]:
| Cross-site scripting (XSS) vulnerability in thumb.php in MediaWiki
| before 1.23.10, 1.24.x before 1.24.3, and 1.25.x before 1.25.2 allows
| remote attackers to inject arbitrary web script or HTML via the f
| parameter, which is not properly handled in an error page, related to
| "ForeignAPI images."

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2015-6727
[1] https://security-tracker.debian.org/tracker/CVE-2015-6728
[2] https://security-tracker.debian.org/tracker/CVE-2015-6729
[3] https://security-tracker.debian.org/tracker/CVE-2015-6730

Regards,
Salvatore



More information about the Pkg-mediawiki-devel mailing list