漏洞类别:CGI
漏洞等级:
漏洞信息
MediaWiki is free and open source wiki software developed by the Wikimedia. It's used to power wiki web sites such as Wikipedia, Wiktionary and Commons.
These releases fix five security issues in core and one for the extension PdfHandler:
(T139565) API: Generate head items in the context of the given title (CVE-2016-6335)
(T137264) XSS in unclosed internal links (CVE-2016-6334)
(T133147) Escape '<' and ']]>' in inline <style> blocks (CVE-2016-6333)
(T133147) Require login to preview user CSS pages (CVE-2016-6333)
(T132926) Do not allow undeleting a revision deleted file if it is the top file (CVE-2016-6336)
(T129738) Make $wgBlockDisablesLogin also restrict logged in permissions (CVE-2016-6332)
(T129738) Make blocks log users out if $wgBlockDisablesLogin is true (CVE-2016-6332)
(T115333) Check read permission when loading page content in ApiParse (CVE-2016-6331)
(T57548) Remove support for $wgWellFormedXml = false, all output is now well formed
The following only affects 1.27 and above and is not included in the 1.26 and 1.23 upgrade:
(T139670) Move 'UserGetRights' call before application of Session::getAllowedUserRights() (CVE-2016-6337)
Affected Versions:
MediaWiki before 1.23.15
MediaWiki 1.26.x before 1.26.4
MediaWiki 1.27.x before 1.27.1
漏洞危害
An attacker could exploit these vulnerabilities to obtain sensitive information, conduct cross-site scripting attacks or cause a denial of service condition on the targeted system.
解决方案
Customers are advised to download and install MediaWiki 1.25.15, 1.26.4, 1.27.1 or later versions to remediate these vulnerabilities.
Patch:
Following are links for downloading patches to fix the vulnerabilities:
0day
文章评论