This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Mediawiki First view 2015-09-01
Product Mediawiki Last view 2020-06-24
Version 1.23.0 Type Application
Update rc3  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:mediawiki:mediawiki

Activity : Overall

Related : CVE

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
3.1 2020-06-24 CVE-2020-15005

In MediaWiki before 1.31.8, 1.32.x and 1.33.x before 1.33.4, and 1.34.x before 1.34.2, private wikis behind a caching server using the img_auth.php image authorization security feature may have had their files cached publicly, so any unauthorized user could view them. This occurs because Cache-Control and Vary headers were mishandled.

6.1 2020-06-02 CVE-2020-10959

resources/src/mediawiki.page.ready/ready.js in MediaWiki before 1.35 allows remote attackers to force a logout and external redirection via HTML content in a MediaWiki page.

5.3 2020-04-03 CVE-2020-10960

In MediaWiki before 1.34.1, users can add various Cascading Style Sheets (CSS) classes (which can affect what content is shown or hidden in the user interface) to arbitrary DOM nodes via HTML content within a MediaWiki page. This occurs because jquery.makeCollapsible allows applying an event handler to any Cascading Style Sheets (CSS) selector. There is no known way to exploit this for cross-site scripting (XSS).

9.8 2020-03-12 CVE-2020-10534

In the GlobalBlocking extension before 2020-03-10 for MediaWiki through 1.34.0, an issue related to IP range evaluation resulted in blocked users re-gaining escalated privileges. This is related to the case in which an IP address is contained in two ranges, one of which is locally disabled.

5.9 2020-01-27 CVE-2014-9481

The Scribunto extension for MediaWiki allows remote attackers to obtain the rollback token and possibly other sensitive information via a crafted module, related to unstripping special page HTML.

6.1 2019-12-11 CVE-2019-19709

MediaWiki through 1.33.1 allows attackers to bypass the Title_blacklist protection mechanism by starting with an arbitrary title, establishing a non-resolvable redirect for the associated page, and using redirect=1 in the action API when editing that page.

5.3 2019-09-25 CVE-2019-16738

In MediaWiki through 1.33.0, Special:Redirect allows information disclosure of suppressed usernames via a User ID Lookup.

7.5 2019-07-10 CVE-2019-12474

Wikimedia MediaWiki 1.23.0 through 1.32.1 has an information leak. Privileged API responses that include whether a recent change has been patrolled may be cached publicly. Fixed in 1.32.2, 1.31.2, 1.30.2 and 1.27.6.

7.5 2019-07-10 CVE-2019-12473

Wikimedia MediaWiki 1.27.0 through 1.32.1 might allow DoS. Passing invalid titles to the API could cause a DoS by querying the entire watchlist table. Fixed in 1.32.2, 1.31.2, 1.30.2 and 1.27.6.

7.5 2019-07-10 CVE-2019-12472

An Incorrect Access Control vulnerability was found in Wikimedia MediaWiki 1.18.0 through 1.32.1. It is possible to bypass the limits on IP range blocks ($wgBlockCIDRLimit) by using the API. Fixed in 1.32.2, 1.31.2, 1.30.2 and 1.27.6.

6.1 2019-07-10 CVE-2019-12471

Wikimedia MediaWiki 1.30.0 through 1.32.1 has XSS. Loading user JavaScript from a non-existent account allows anyone to create the account, and perform XSS on users loading that script. Fixed in 1.32.2, 1.31.2, 1.30.2 and 1.27.6.

6.5 2019-07-10 CVE-2019-12470

Wikimedia MediaWiki through 1.32.1 has Incorrect Access Control. Suppressed log in RevisionDelete page is exposed. Fixed in 1.32.2, 1.31.2, 1.30.2 and 1.27.6.

6.5 2019-07-10 CVE-2019-12469

MediaWiki through 1.32.1 has Incorrect Access Control. Suppressed username or log in Special:EditTags are exposed. Fixed in 1.32.2, 1.31.2, 1.30.2 and 1.27.6.

9.8 2019-07-10 CVE-2019-12468

An Incorrect Access Control vulnerability was found in Wikimedia MediaWiki 1.27.0 through 1.32.1. Directly POSTing to Special:ChangeEmail would allow for bypassing re-authentication, allowing for potential account takeover.

5.3 2019-07-10 CVE-2019-12467

MediaWiki through 1.32.1 has Incorrect Access Control (issue 1 of 3). A spammer can use Special:ChangeEmail to send out spam with no rate limiting or ability to block them. Fixed in 1.32.2, 1.31.2, 1.30.2 and 1.27.6.

8.8 2019-07-10 CVE-2019-12466

Wikimedia MediaWiki through 1.32.1 allows CSRF.

5.3 2018-10-04 CVE-2018-13258

Mediawiki 1.31 before 1.31.1 misses .htaccess files in the provided tarball used to protect some directories that shouldn't be web accessible.

6.5 2018-10-04 CVE-2018-0505

Mediawiki 1.31 before 1.31.1, 1.30.1, 1.29.3 and 1.27.5 contains a flaw where BotPasswords can bypass CentralAuth's account lock

6.5 2018-10-04 CVE-2018-0504

Mediawiki 1.31 before 1.31.1, 1.30.1, 1.29.3 and 1.27.5 contains an information disclosure flaw in the Special:Redirect/logid

4.3 2018-10-04 CVE-2018-0503

Mediawiki 1.31 before 1.31.1, 1.30.1, 1.29.3 and 1.27.5 contains a flaw where contrary to the documentation, $wgRateLimits entry for 'user' overrides that for 'newbie'.

9.8 2018-04-13 CVE-2017-0372

Parameters injection in the SyntaxHighlight extension of Mediawiki before 1.23.16, 1.27.3 and 1.28.2 might result in multiple vulnerabilities.

5.3 2018-04-13 CVE-2017-0370

Mediawiki before 1.28.1 / 1.27.2 / 1.23.16 contains a flaw were Spam blacklist is ineffective on encoded URLs inside file inclusion syntax's link parameter.

6.5 2018-04-13 CVE-2017-0369

Mediawiki before 1.28.1 / 1.27.2 / 1.23.16 contains a flaw, allowing a sysops to undelete pages, although the page is protected against it.

5.3 2018-04-13 CVE-2017-0368

Mediawiki before 1.28.1 / 1.27.2 / 1.23.16 contains a flaw making rawHTML mode apply to system messages.

8.8 2018-04-13 CVE-2017-0367

Mediawiki before 1.28.1 / 1.27.2 contains an unsafe use of temporary directory, where having LocalisationCache directory default to system tmp directory is insecure.

CWE : Common Weakness Enumeration

%idName
21% (12) CWE-200 Information Exposure
15% (9) CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting')
10% (6) CWE-20 Improper Input Validation
8% (5) CWE-352 Cross-Site Request Forgery (CSRF)
8% (5) CWE-284 Access Control (Authorization) Issues
7% (4) CWE-601 URL Redirection to Untrusted Site ('Open Redirect')
5% (3) CWE-399 Resource Management Errors
3% (2) CWE-269 Improper Privilege Management
3% (2) CWE-255 Credentials Management
3% (2) CWE-74 Failure to Sanitize Data into a Different Plane ('Injection')
1% (1) CWE-668 Exposure of Resource to Wrong Sphere
1% (1) CWE-532 Information Leak Through Log Files
1% (1) CWE-306 Missing Authentication for Critical Function
1% (1) CWE-287 Improper Authentication
1% (1) CWE-276 Incorrect Default Permissions
1% (1) CWE-264 Permissions, Privileges, and Access Controls
1% (1) CWE-116 Improper Encoding or Escaping of Output

Snort® IPS/IDS

Date Description
2018-01-04 MediaWiki arbitrary file write attempt
RuleID : 45094 - Type : SERVER-WEBAPP - Revision : 2

Nessus® Vulnerability Scanner

id Description
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-f4b65fc7cd.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-e022ecbc52.nasl - Type: ACT_GATHER_INFO
2018-10-09 Name: The remote Fedora host is missing a security update.
File: fedora_2018-edf90410ea.nasl - Type: ACT_GATHER_INFO
2018-09-24 Name: The remote FreeBSD host is missing one or more security-related updates.
File: freebsd_pkg_be1aada2be6c11e88fc6000c29434208.nasl - Type: ACT_GATHER_INFO
2018-09-24 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-4301.nasl - Type: ACT_GATHER_INFO
2017-11-20 Name: The remote FreeBSD host is missing one or more security-related updates.
File: freebsd_pkg_298829e2ccce11e792e4000c29649f92.nasl - Type: ACT_GATHER_INFO
2017-11-16 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-4036.nasl - Type: ACT_GATHER_INFO
2017-05-16 Name: The remote Fedora host is missing a security update.
File: fedora_2017-2643ef1cad.nasl - Type: ACT_GATHER_INFO
2017-04-17 Name: The remote Fedora host is missing a security update.
File: fedora_2017-3fb95ed01f.nasl - Type: ACT_GATHER_INFO
2016-11-15 Name: The remote Fedora host is missing a security update.
File: fedora_2016-9299ce1c7d.nasl - Type: ACT_GATHER_INFO
2016-09-08 Name: The remote Fedora host is missing a security update.
File: fedora_2016-ce1678471e.nasl - Type: ACT_GATHER_INFO
2016-09-08 Name: The remote Fedora host is missing a security update.
File: fedora_2016-af3b0af887.nasl - Type: ACT_GATHER_INFO
2016-08-29 Name: An application running on the remote web server is affected by multiple vulne...
File: mediawiki_1_27_1.nasl - Type: ACT_GATHER_INFO
2016-03-04 Name: The remote Fedora host is missing a security update.
File: fedora_2015-ec6d598d3d.nasl - Type: ACT_GATHER_INFO
2016-03-04 Name: The remote Fedora host is missing a security update.
File: fedora_2015-97fe05f788.nasl - Type: ACT_GATHER_INFO
2016-03-04 Name: The remote Fedora host is missing a security update.
File: fedora_2015-24fe8b66c9.nasl - Type: ACT_GATHER_INFO
2015-12-29 Name: The remote FreeBSD host is missing one or more security-related updates.
File: freebsd_pkg_f36bbd66aa4411e58f5c002590263bf5.nasl - Type: ACT_GATHER_INFO
2015-11-02 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201510-05.nasl - Type: ACT_GATHER_INFO
2015-10-23 Name: The remote FreeBSD host is missing one or more security-related updates.
File: freebsd_pkg_b973a763793611e5a2a1002590263bf5.nasl - Type: ACT_GATHER_INFO
2015-08-31 Name: The remote Fedora host is missing a security update.
File: fedora_2015-13920.nasl - Type: ACT_GATHER_INFO
2015-08-17 Name: The remote FreeBSD host is missing one or more security-related updates.
File: freebsd_pkg_6241b5df42a111e593ad002590263bf5.nasl - Type: ACT_GATHER_INFO
2015-02-09 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201502-04.nasl - Type: ACT_GATHER_INFO