Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2011-4361 | First vendor Publication | 2012-01-08 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:N/A:N) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
MediaWiki before 1.17.1 does not check for read permission before handling action=ajax requests, which allows remote attackers to obtain sensitive information by (1) leveraging the SpecialUpload::ajaxGetExistsWarning function, or by (2) leveraging an extension, as demonstrated by the CategoryTree, ExtTab, and InlineEditor extensions. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4361 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-276 | Incorrect Default Permissions |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:15086 | |||
Oval ID: | oval:org.mitre.oval:def:15086 | ||
Title: | DSA-2366-1 mediawiki -- multiple | ||
Description: | Several problems have been discovered in mediawiki, a website engine for collaborative work. CVE-2011-1578 CVE-2011-1587 Masato Kinugawa discovered a cross-site scripting issue, which affects Internet Explorer clients only, and only version 6 and earlier. Web server configuration changes are required to fix this issue. Upgrading MediaWiki will only be sufficient for people who use Apache with AllowOverride enabled. This is an XSS issue for Internet Explorer clients, and a privacy loss issue for other clients since it allows the embedding of arbitrary remote images. CVE-2011-1580 MediaWiki developer Happy-Melon discovered that the transwiki import feature neglected to perform access control checks on form submission. The transwiki import feature is disabled by default. If it is enabled, it allows wiki pages to be copied from a remote wiki listed in $wgImportSources. The issue means that any user can trigger such an import to occur. CVE-2011-4360 Alexandre Emsenhuber discovered an issue where page titles on private wikis could be exposed bypassing different page ids to index.php. In the case of the user not having correct permissions, they will now be redirected to Special:BadTitle. CVE-2011-4361 Tim Starling discovered that action=ajax requests were dispatched to the relevant function without any read permission checks being done. This could have led to data leakage on private wikis. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2366-1 CVE-2011-1578 CVE-2011-1579 CVE-2011-1580 CVE-2011-1587 CVE-2011-4360 CVE-2011-4361 | Version: | 7 |
Platform(s): | Debian GNU/Linux 5.0 Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 | Product(s): | mediawiki |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2012-02-11 | Name : Debian Security Advisory DSA 2366-1 (mediawiki) File : nvt/deb_2366_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
77365 | MediaWiki Ajax Request Parsing File Existance Disclosure |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2012-01-12 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2366.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:03:09 |
|
2024-11-28 12:27:47 |
|
2021-05-04 12:18:54 |
|
2021-04-22 00:23:34 |
|
2020-05-24 01:08:31 |
|
2020-05-23 01:47:32 |
|
2020-05-23 00:32:13 |
|
2018-10-23 12:03:47 |
|
2016-06-28 18:54:16 |
|
2014-02-17 11:06:15 |
|
2013-05-10 23:10:38 |
|