Lucene search

K
debianDebianDEBIAN:DLA-3671-1:FFA00
HistoryNov 28, 2023 - 11:46 a.m.

[SECURITY] [DLA 3671-1] mediawiki security update

2023-11-2811:46:19
lists.debian.org
10
cve-2023-45363
cve-2023-3550
denial of service
cve-2023-45362
privilege escalation
mediawiki
debian 10 buster
security update

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.2

Confidence

High

EPSS

0.001

Percentile

51.1%


Debian LTS Advisory DLA-3671-1 [email protected]
https://www.debian.org/lts/security/ Guilhem Moulin
November 28, 2023 https://wiki.debian.org/LTS

Package : mediawiki
Version : 1:1.31.16-1+deb10u7
CVE ID : CVE-2023-3550 CVE-2023-45362 CVE-2023-45363

Multiple vulnerabilities were found in mediawiki, a website engine for
collaborative work, that could lead to information disclosure, privilege
escalation, or denial of service.

CVE-2023-3550

Carlos Bello reported a stored cross-site scripting (XSS)
vulnerability when uploading crafted XML file to Special:Upload,
which can lead to privilege escalation.  (However .xml file uploads
are not allowed in the default configuration.)

CVE-2023-45362

Tobias Frei discovered that diff-multi-sameuser (“X intermediate
revisions by the same user not shown”) ignores username suppression,
which can lead to information leak.

CVE-2023-45363

It was discovered that querying pages redirected to other variants
with `redirects` and `converttitles` parameters set would cause
a denial of service (unbounded loop and RequestTimeoutException).

For Debian 10 buster, these problems have been fixed in version
1:1.31.16-1+deb10u7.

We recommend that you upgrade your mediawiki packages.

For the detailed security status of mediawiki please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/mediawiki

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
Attachment:
signature.asc
Description: PGP signature

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.2

Confidence

High

EPSS

0.001

Percentile

51.1%