Korean
<< Back
VID 21685
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The MediaWiki, according to its version number, has a cross-site scripting vulnerability in page templates. MediaWiki is a freely available editing program for Wikipedia, Wiktionary, and other software written in PHP. MediaWiki versions 1.3.12 and 1.4.4 and possibly earlier versions could allow a remote attacker to inject arbitrary web script via HTML attributes in page templates. This vulnerability could permit a remote attacker to create a malicious URI link that includes hostile HTML and script code. If this link were to be followed, the hostile code may be rendered in the web browser of the victim user. This would occur in the security context of the affected web site and may allow for theft of cookie-based authentication credentials or other attacks.

* Note: This check solely relied on the version number of MediaWiki on the remote Web server to assess this vulnerability, so this might be a false positive.

* References:
http://bugzilla.wikimedia.org/show_bug.cgi?id=2304
http://secunia.com/advisories/15590/

* Platforms Affected:
The Wikimedia Foundation, Inc., MediaWiki versions prior to 1.3.13
The Wikimedia Foundation, Inc., MediaWiki versions 1.4.x prior to 1.4.5
Any operating system Any version
Recommendation Upgrade to the latest version of MediaWiki (1.3.13 or 1.4.5 or later), available from the MediaWiki Web page at http://wikipedia.sourceforge.net/

For Gentoo Linux:
Upgrade to the latest version of MediaWiki (1.4.5 or later), as listed in Gentoo Linux Security Announcement GLSA 200506-12 at http://www.gentoo.org/security/en/glsa/glsa-200506-12.xml
Related URL CVE-2005-1888 (CVE)
Related URL 13861 (SecurityFocus)
Related URL 20912 (ISS)