VID |
21686 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The MediaWiki, according to its version number, has a cross-site scripting vulnerability in the page move template. MediaWiki is a freely available editing program for Wikipedia, Wiktionary, and other software written in PHP. MediaWiki versions 1.4.5 and earlier and versions 1.5 alpha2 and earlier could allow a remote attacker to inject arbitrary web script via a parameter in the page move template. This vulnerability could permit a remote attacker to create a malicious URI link that includes hostile HTML and script code. If this link were to be followed, the hostile code may be rendered in the web browser of the victim user. This would occur in the security context of the affected web site and may allow for theft of cookie-based authentication credentials or other attacks.
* Note: This check solely relied on the version number of MediaWiki on the remote Web server to assess this vulnerability, so this might be a false positive.
* References: http://bugzilla.wikimedia.org/show_bug.cgi?id=2304 http://www.osvdb.org/displayvuln.php?osvdb_id=17763 http://archives.neohapsis.com/archives/fulldisclosure/2005-07/0470.html
* Platforms Affected: The Wikimedia Foundation, Inc., MediaWiki versions 1.5 alpha2 and earlier The Wikimedia Foundation, Inc., MediaWiki versions 1.5 beta2 and earlier The Wikimedia Foundation, Inc., MediaWiki versions 1.4.5 and earlier The Wikimedia Foundation, Inc., MediaWiki 1.4 beta6 Any operating system Any version |
Recommendation |
Upgrade to the latest version of MediaWiki (1.4.7 or later), available from the MediaWiki Web page at http://wikipedia.sourceforge.net/
For Gentoo Linux: Upgrade to the latest version of MediaWiki (1.4.7 or later), as listed in Gentoo Linux Security Announcement GLSA 200507-18 at http://www.gentoo.org/security/en/glsa/glsa-200507-18.xml |
Related URL |
CVE-2005-2215 (CVE) |
Related URL |
14181 (SecurityFocus) |
Related URL |
21491 (ISS) |
|