Korean
<< Back
VID 21752
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The MediaWiki sofware, according to its version number, has multiple vulnerabilities. MediaWiki is a freely available editing program for Wikipedia, Wiktionary, and other software written in PHP. MediaWiki versions prior to 1.3.17, 1.4.11 and 1.5.0 are vulnerable to multiple vulnerabilities, which can be exploited by a remote attacker to conduct cross-site scripting and database corruption attacks:

1) MediaWiki History Database Corruption Vulnerability: A bug in MediaWiki Wiki edit submission handling routine could cause corruption of the previous revision in the database if an abnormal URL was used, such as those used by some spam bots.
2) A Cross-Site Scripting Vulnerability: User-input for HTML inline style attributes isn't properly sanitized before being used. This can be exploited to inject arbitrary script code, which will be executed in a user's browser session in context of an affected site when the malicious user data is viewed.

* Note: This check solely relied on the version number of MediaWiki on the remote Web server to assess this vulnerability, so this might be a false positive.

* References:
http://sourceforge.net/project/shownotes.php?release_id=342530
http://sourceforge.net/forum/forum.php?forum_id=501174
http://secunia.com/advisories/17074/

* Platforms Affected:
The Wikimedia Foundation, Inc., MediaWiki prior to 1.3.17
The Wikimedia Foundation, Inc., MediaWiki prior to 1.4.11
The Wikimedia Foundation, Inc., MediaWiki prior to 1.5.0
Any operating system Any version
Recommendation Upgrade to the latest version of MediaWiki (1.3.17 or 1.4.11 or 1.5.0 or later), available from the MediaWiki Web page at http://www.mediawiki.org/wiki/Download#Stable
Related URL CVE-2005-3167 (CVE)
Related URL 15024,15041 (SecurityFocus)
Related URL 22533 (ISS)