Updated mediawiki packages fix security vulnerabilities
Publication date: 24 Dec 2015Modification date: 24 Dec 2015
Type: security
Affected Mageia releases : 5
CVE: CVE-2015-8622 , CVE-2015-8623 , CVE-2015-8624 , CVE-2015-8625 , CVE-2015-8626 , CVE-2015-8627 , CVE-2015-8628
Description
Updated mediawiki packages fix security vulnerabilities: In MediaWiki before 1.23.12, an XSS vector exists when MediaWiki is configured with a non-standard configuration, from wikitext when $wgArticlePath='$1' (CVE-2015-8622). In MediaWiki before 1.23.12, tokens were being compared as strings, which could allow a timing attack (CVE-2015-8623, CVE-2015-8624). In MediaWiki before 1.23.12, parameters passed to the curl library were not sanitized, which could cause curl to upload files from the webserver to an attacker when POST variable starts with '@' (CVE-2015-8625). In MediaWiki before 1.23.12, the password reset token could be shorter than the minimum required password length (CVE-2015-8626). In MediaWiki before 1.23.12, blocking IP addresses with zero-padded octets resulted in a failure to block the IP address (CVE-2015-8627). In MediaWiki before 1.23.12, a combination of Special:MyPage redirects and pagecounts allows an external site to know the wikipedia login of an user (CVE-2015-8628).
References
- https://bugs.mageia.org/show_bug.cgi?id=17379
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-December/000186.html
- http://openwall.com/lists/oss-security/2015/12/23/7
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8622
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8623
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8624
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8625
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8626
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8627
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8628
SRPMS
5/core
- mediawiki-1.23.12-1.mga5