Vigil@nce - MediaWiki: six vulnerabilities
March 2016 by Vigil@nce
This bulletin was written by Vigil@nce : https://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can use several vulnerabilities of MediaWiki.
Impacted products: Fedora.
Severity: 2/4.
Creation date: 04/01/2016.
DESCRIPTION OF THE VULNERABILITY
Several vulnerabilities were announced in MediaWiki.
An attacker can trigger a Cross Site Scripting in wikitext, in
order to run JavaScript code in the context of the web site.
[severity:2/4]
An attacker can bypass security features in User::matchEditToken,
in order to obtain sensitive information. [severity:2/4]
An attacker can upload a malicious file via VirtualRESTService, in
order for example to upload a Trojan. [severity:2/4]
Passwords generated with User::randomPassword are too weak.
[severity:2/4]
An attacker can bypass security features in IP Global Block, in
order to escalate his privileges. [severity:2/4]
An attacker can bypass security features in Special:MyPage, in
order to obtain sensitive information. [severity:2/4]
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
https://vigilance.fr/vulnerability/MediaWiki-six-vulnerabilities-18626