Gentoo Archives: gentoo-announce

From: Stefan Behte <craig@g.o>
To: gentoo-announce@g.o
Subject: [gentoo-announce] [ GLSA 201206-09 ] MediaWiki: Multiple vulnerabilites
Date: Thu, 21 Jun 2012 18:26:26
Message-Id: 4FE36441.2010405@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 201206-09
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: High
8 Title: MediaWiki: Multiple vulnerabilites
9 Date: June 21, 2012
10 Bugs: #366685, #409513
11 ID: 201206-09
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 Multiple vulnerabilities have been found in MediaWiki, the worst of
19 which leading to remote execution of arbitrary code.
20
21 Background
22 ==========
23
24 The MediaWiki wiki web application as used on wikipedia.org.
25
26 Affected packages
27 =================
28
29 -------------------------------------------------------------------
30 Package / Vulnerable / Unaffected
31 -------------------------------------------------------------------
32 1 www-apps/mediawiki < 1.18.2 >= 1.18.2
33
34 Description
35 ===========
36
37 Multiple vulnerabilities have been discovered in mediawiki. Please
38 review the CVE identifiers referenced below for details.
39
40 Impact
41 ======
42
43 MediaWiki allows remote attackers to bypass authentication, to perform
44 imports from any wgImportSources wiki via a crafted POST request, to
45 conduct cross-site scripting (XSS) attacks or obtain sensitive
46 information, to inject arbitrary web script or HTML, to conduct
47 clickjacking attacks, to execute arbitrary PHP code, to inject
48 arbitrary web script or HTML, to bypass intended access restrictions
49 and to obtain sensitive information.
50
51 Workaround
52 ==========
53
54 There is no known workaround at this time.
55
56 Resolution
57 ==========
58
59 All MediaWiki users should upgrade to the latest version:
60
61 # emerge --sync
62 # emerge --ask --oneshot --verbose ">=www-apps/mediawiki-1.18.2"
63
64 References
65 ==========
66
67 [ 1 ] CVE-2010-2787
68 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2787
69 [ 2 ] CVE-2010-2788
70 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2788
71 [ 3 ] CVE-2010-2789
72 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2789
73 [ 4 ] CVE-2011-0003
74 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0003
75 [ 5 ] CVE-2011-0047
76 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0047
77 [ 6 ] CVE-2011-0537
78 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0537
79 [ 7 ] CVE-2011-1579
80 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1579
81 [ 8 ] CVE-2011-1580
82 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1580
83 [ 9 ] CVE-2011-1766
84 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1766
85 [ 10 ] CVE-2011-1766
86 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1766
87 [ 11 ] CVE-2012-1578
88 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1578
89 [ 12 ] CVE-2012-1579
90 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1579
91 [ 13 ] CVE-2012-1580
92 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1580
93 [ 14 ] CVE-2012-1581
94 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1581
95 [ 15 ] CVE-2012-1582
96 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1582
97
98 Availability
99 ============
100
101 This GLSA and any updates to it are available for viewing at
102 the Gentoo Security Website:
103
104 http://security.gentoo.org/glsa/glsa-201206-09.xml
105
106 Concerns?
107 =========
108
109 Security is a primary focus of Gentoo Linux and ensuring the
110 confidentiality and security of our users' machines is of utmost
111 importance to us. Any security concerns should be addressed to
112 security@g.o or alternatively, you may file a bug at
113 https://bugs.gentoo.org.
114
115 License
116 =======
117
118 Copyright 2012 Gentoo Foundation, Inc; referenced text
119 belongs to its owner(s).
120
121 The contents of this document are licensed under the
122 Creative Commons - Attribution / Share Alike license.
123
124 http://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature