Advisories ยป MGASA-2015-0486

Updated mediawiki packages fix security vulnerabilities

Publication date: 24 Dec 2015
Modification date: 24 Dec 2015
Type: security
Affected Mageia releases : 5
CVE: CVE-2015-8622 , CVE-2015-8623 , CVE-2015-8624 , CVE-2015-8625 , CVE-2015-8626 , CVE-2015-8627 , CVE-2015-8628

Description

Updated mediawiki packages fix security vulnerabilities:

In MediaWiki before 1.23.12, an XSS vector exists when MediaWiki is
configured with a non-standard configuration, from wikitext when
$wgArticlePath='$1' (CVE-2015-8622).

In MediaWiki before 1.23.12, tokens were being compared as strings, which
could allow a timing attack (CVE-2015-8623, CVE-2015-8624).

In MediaWiki before 1.23.12, parameters passed to the curl library were not
sanitized, which could cause curl to upload files from the webserver to an
attacker when POST variable starts with '@' (CVE-2015-8625).

In MediaWiki before 1.23.12, the password reset token could be shorter than
the minimum required password length (CVE-2015-8626).

In MediaWiki before 1.23.12, blocking IP addresses with zero-padded octets
resulted in a failure to block the IP address (CVE-2015-8627).

In MediaWiki before 1.23.12, a combination of Special:MyPage redirects and
pagecounts allows an external site to know the wikipedia login of an user
(CVE-2015-8628).
                

References

SRPMS

5/core