FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

mediawiki -- multiple vulnerabilities

Affected packages
mediawiki < 1.16.2

Details

VuXML ID 8d04cfbd-344d-11e0-8669-0025222482c5
Discovery 2011-02-01
Entry 2011-02-09

Medawiki reports:

An arbitrary script inclusion vulnerability was discovered. The vulnerability only allows execution of files with names ending in ".php" which are already present in the local filesystem. Only servers running Microsoft Windows and possibly Novell Netware are affected. Despite these mitigating factors, all users are advised to upgrade, since there is a risk of complete server compromise. MediaWiki 1.8.0 and later is affected.

Security researcher mghack discovered a CSS injection vulnerability. For Internet Explorer and similar browsers, this is equivalent to an XSS vulnerability, that is to say, it allows the compromise of wiki user accounts. For other browsers, it allows private data such as IP addresses and browsing patterns to be sent to a malicious external web server. It affects all versions of MediaWiki. All users are advised to upgrade.

References

CVE Name CVE-2011-0047
URL http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-February/000095.html
URL http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_16_2/phase3/RELEASE-NOTES
URL https://bugzilla.wikimedia.org/show_bug.cgi?id=27093
URL https://bugzilla.wikimedia.org/show_bug.cgi?id=27094