Executive Summary
Summary | |
---|---|
Title | mediawiki security update |
Informations | |||
---|---|---|---|
Name | DSA-3011 | First vendor Publication | 2014-08-23 |
Vendor | Debian | Last vendor Modification | 2014-08-23 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 6.8 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
It was discovered that MediaWiki, a website engine for collaborative work, is vulnerable to JSONP injection in Flash (CVE-2014-5241) and clickjacking between OutputPage and ParserOutput (CVE-2014-5243). The vulnerabilities are addressed by upgrading MediaWiki to the new upstream version 1.19.18, which includes additional changes. For the stable distribution (wheezy), these problems have been fixed in version 1:1.19.18+dfsg-0+deb7u1. For the unstable distribution (sid), these problems will be fixed soon. We recommend that you upgrade your mediawiki packages. |
Original Source
Url : http://www.debian.org/security/2014/dsa-3011 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
50 % | CWE-352 | Cross-Site Request Forgery (CSRF) (CWE/SANS Top 25) |
50 % | CWE-20 | Improper Input Validation |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:26197 | |||
Oval ID: | oval:org.mitre.oval:def:26197 | ||
Title: | DSA-3011-1 mediawiki - security update | ||
Description: | It was discovered that MediaWiki, a website engine for collaborative work, is vulnerable to JSONP injection in Flash (<a href="https://security-tracker.debian.org/tracker/CVE-2014-5241">CVE-2014-5241</a>) and clickjacking between OutputPage and ParserOutput (<a href="https://security-tracker.debian.org/tracker/CVE-2014-5243">CVE-2014-5243</a>). The vulnerabilities are addressed by upgrading MediaWiki to the new upstream version 1.19.18, which includes additional changes. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-3011-1 CVE-2014-5241 CVE-2014-5243 | Version: | 3 |
Platform(s): | Debian GNU/Linux 7.0 Debian GNU/kFreeBSD 7.0 | Product(s): | mediawiki |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2015-02-09 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201502-04.nasl - Type : ACT_GATHER_INFO |
2014-08-27 | Name : The remote Fedora host is missing a security update. File : fedora_2014-9548.nasl - Type : ACT_GATHER_INFO |
2014-08-27 | Name : The remote Fedora host is missing a security update. File : fedora_2014-9583.nasl - Type : ACT_GATHER_INFO |
2014-08-25 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-3011.nasl - Type : ACT_GATHER_INFO |
2014-08-13 | Name : The remote web server contains an application that is affected by multiple vu... File : mediawiki_1_23_2.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-08-26 13:24:39 |
|
2014-08-26 00:25:02 |
|
2014-08-23 21:22:54 |
|