Lucene search

K
debianDebianDEBIAN:DSA-2957-1:443D8
HistoryJun 12, 2014 - 5:59 p.m.

[SECURITY] [DSA 2957-1] mediawiki security update

2014-06-1217:59:07
lists.debian.org
13

2.6 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:N/I:P/A:N

5.4 Medium

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

69.3%


Debian Security Advisory DSA-2957-1 [email protected]
http://www.debian.org/security/ Thijs Kinkhorst
June 12, 2014 http://www.debian.org/security/faq


Package : mediawiki
CVE ID : CVE-2014-3966

Omer Iqbal discovered that Mediawiki, a wiki engine, parses invalid
usernames on Special:PasswordReset as wikitext when $wgRawHtml is
enabled. On such wikis this allows an unauthenticated attacker to
insert malicious JavaScript, a cross site scripting attack.

For the stable distribution (wheezy), this problem has been fixed in
version 1:1.19.16+dfsg-0+deb7u1.

For the unstable distribution (sid), this problem has been fixed in
version 1:1.19.16+dfsg-1.

We recommend that you upgrade your mediawiki packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: [email protected]

OSVersionArchitecturePackageVersionFilename
Debian7allmediawiki< 1:1.19.16+dfsg-0+deb7u1mediawiki_1:1.19.16+dfsg-0+deb7u1_all.deb

2.6 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:N/I:P/A:N

5.4 Medium

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

69.3%