Lucene search

K
mageiaGentoo FoundationMGASA-2023-0241
HistoryJul 27, 2023 - 1:07 a.m.

Updated mediawiki packages fix security vulnerability

2023-07-2701:07:49
Gentoo Foundation
advisories.mageia.org
21
mediawiki
psr-7
http
security
vulnerability
guzzlehttp/psr7
improper header parsing
cve-2023-29197
cve-2023-36674
cve-2023-36675
unix

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

0.003 Low

EPSS

Percentile

65.6%

guzzlehttp/psr7 is a PSR-7 HTTP message library implementation in PHP. Affected versions are subject to improper header parsing. An attacker could sneak in a newline (\n) into both the header names and values. While the specification states that \r\n\r\n is used to terminate the header list, many servers in the wild will also accept \n\n (CVE-2023-29197). Manualthumb bypasses badFile lookup (CVE-2023-36674). XSS in BlockLogFormatter due to unsafe message use (CVE-2023-36675).

OSVersionArchitecturePackageVersionFilename
Mageia8noarchmediawiki< 1.35.11-1mediawiki-1.35.11-1.mga8

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

0.003 Low

EPSS

Percentile

65.6%