Lucene search

K
openvasCopyright (C) 2017 Greenbone AGOPENVAS:1361412562310106784
HistoryApr 21, 2017 - 12:00 a.m.

MediaWiki Multiple Vulnerabilities (Aug 2016) - Windows

2017-04-2100:00:00
Copyright (C) 2017 Greenbone AG
plugins.openvas.org
12

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

6.9 Medium

AI Score

Confidence

High

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.003 Low

EPSS

Percentile

69.4%

MediaWiki is prone to multiple vulnerabilities.

# SPDX-FileCopyrightText: 2017 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = 'cpe:/a:mediawiki:mediawiki';

if (description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.106784");
  script_version("2024-02-08T05:05:59+0000");
  script_tag(name:"last_modification", value:"2024-02-08 05:05:59 +0000 (Thu, 08 Feb 2024)");
  script_tag(name:"creation_date", value:"2017-04-21 11:45:55 +0200 (Fri, 21 Apr 2017)");
  script_tag(name:"cvss_base", value:"5.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:P/A:N");
  script_tag(name:"severity_vector", value:"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2017-04-24 20:25:00 +0000 (Mon, 24 Apr 2017)");

  script_tag(name:"qod_type", value:"remote_banner");

  script_cve_id("CVE-2016-6331", "CVE-2016-6332", "CVE-2016-6333", "CVE-2016-6334", "CVE-2016-6335",
"CVE-2016-6336", "CVE-2016-6337");

  script_tag(name:"solution_type", value:"VendorFix");

  script_name("MediaWiki Multiple Vulnerabilities (Aug 2016) - Windows");

  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2017 Greenbone AG");
  script_family("Web application abuses");
  script_dependencies("secpod_mediawiki_detect.nasl", "os_detection.nasl");
  script_mandatory_keys("mediawiki/installed", "Host/runs_windows");

  script_tag(name:"summary", value:"MediaWiki is prone to multiple vulnerabilities.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");

  script_tag(name:"insight", value:"MediaWiki is prone to multiple vulnerabilities:

  - ApiParse allows remote attackers to bypass intended per-title read restrictions via a parse action to api.php.
(CVE-2016-6331)

  - Remote attackers may obtain sensitive information by leveraging failure to terminate sessions when a user
account is blocked and when $wgBlockDisablesLogin is true. (CVE-2016-6332)

  - Cross-site scripting (XSS) vulnerability in the CSS user subpage preview feature allows remote attackers to
inject arbitrary web script or HTML via the edit box in Special:MyPage/common.css. (CVE-2016-6333)

  - Cross-site scripting (XSS) vulnerability in the Parser::replaceInternalLinks2 method allows remote attackers to
inject arbitrary web script or HTML via vectors involving replacement of percent encoding in unclosed internal
links. (CVE-2016-6334)

  - MediaWiki does not generate head items in the context of a given title, which allows remote attackers to obtain
sensitive information via a parse action to api.php. (CVE-2016-6335)

  - Remote authenticated users with undelete permissions may bypass intended suppressrevision and deleterevision
restrictions and remove the revision deletion status of arbitrary file revisions by using Special:Undelete.
(CVE-2016-6336)

  - Remote attackers may bypass intended session access restrictions by leveraging a call to the UserGetRights
function after Session::getAllowedUserRights. (CVE-2016-6337)");

  script_tag(name:"affected", value:"MediaWiki before 1.23.15, 1.26.x before 1.26.4, and 1.27.x before 1.27.1");

  script_tag(name:"solution", value:"Upgrade to version 1.23.15, 1.26.4, 1.27.1 or later.");

  script_xref(name:"URL", value:"https://lists.wikimedia.org/pipermail/mediawiki-announce/2016-August/000195.html");

  exit(0);
}

include("host_details.inc");
include("version_func.inc");

if (!port = get_app_port(cpe: CPE))
  exit(0);

if (!version = get_app_version(cpe: CPE, port: port))
  exit(0);

if (version_is_less(version: version, test_version: "1.23.15")) {
  report = report_fixed_ver(installed_version: version, fixed_version: "1.23.15");
  security_message(port: port, data: report);
  exit(0);
}

if (version_in_range(version: version, test_version: "1.26.0", test_version2: "1.26.3")) {
  report = report_fixed_ver(installed_version: version, fixed_version: "1.26.3");
  security_message(port: port, data: report);
  exit(0);
}

if (version_is_equal(version: version, test_version: "1.27.0")) {
  report = report_fixed_ver(installed_version: version, fixed_version: "1.27.1");
  security_message(port: port, data: report);
  exit(0);
}

exit(0);

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

6.9 Medium

AI Score

Confidence

High

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.003 Low

EPSS

Percentile

69.4%