ALT-PU-2014-1374-1
Closed vulnerabilities
Modified: 2025-04-11
CVE-2010-1150
MediaWiki before 1.15.3, and 1.6.x before 1.16.0beta2, does not properly handle a correctly authenticated but unintended login attempt, which makes it easier for remote authenticated users to conduct phishing attacks by arranging for a victim to login to the attacker's account and then execute a crafted user script, related to a "login CSRF" issue.
- http://download.wikimedia.org/mediawiki/1.15/mediawiki-1.15.3.patch.gz
- http://download.wikimedia.org/mediawiki/1.16/mediawiki-1.16.0beta2.patch.gz
- http://lists.wikimedia.org/pipermail/mediawiki-announce/2010-April/000090.html
- http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_15_3/phase3/RELEASE-NOTES
- http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_16_0beta2/phase3/RELEASE-NOTES
- http://www.debian.org/security/2010/dsa-2041
- http://www.openwall.com/lists/oss-security/2010/04/07/1
- http://www.openwall.com/lists/oss-security/2010/04/08/4
- http://www.vupen.com/english/advisories/2010/1055
- https://bugzilla.redhat.com/show_bug.cgi?id=580418
- https://bugzilla.wikimedia.org/show_bug.cgi?id=23076
- http://download.wikimedia.org/mediawiki/1.15/mediawiki-1.15.3.patch.gz
- http://download.wikimedia.org/mediawiki/1.16/mediawiki-1.16.0beta2.patch.gz
- http://lists.wikimedia.org/pipermail/mediawiki-announce/2010-April/000090.html
- http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_15_3/phase3/RELEASE-NOTES
- http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_16_0beta2/phase3/RELEASE-NOTES
- http://www.debian.org/security/2010/dsa-2041
- http://www.openwall.com/lists/oss-security/2010/04/07/1
- http://www.openwall.com/lists/oss-security/2010/04/08/4
- http://www.vupen.com/english/advisories/2010/1055
- https://bugzilla.redhat.com/show_bug.cgi?id=580418
- https://bugzilla.wikimedia.org/show_bug.cgi?id=23076
Modified: 2025-04-11
CVE-2010-1647
Cross-site scripting (XSS) vulnerability in MediaWiki 1.15 before 1.15.4 and 1.16 before 1.16 beta 3 allows remote attackers to inject arbitrary web script or HTML via crafted Cascading Style Sheets (CSS) strings that are processed as script by Internet Explorer.
- http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043803.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043856.html
- http://lists.wikimedia.org/pipermail/mediawiki-announce/2010-May/000091.html
- https://bugzilla.wikimedia.org/show_bug.cgi?id=23687
- http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043803.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043856.html
- http://lists.wikimedia.org/pipermail/mediawiki-announce/2010-May/000091.html
- https://bugzilla.wikimedia.org/show_bug.cgi?id=23687
Modified: 2025-04-11
CVE-2010-1648
Cross-site request forgery (CSRF) vulnerability in the login interface in MediaWiki 1.15 before 1.15.4 and 1.16 before 1.16 beta 3 allows remote attackers to hijack the authentication of users for requests that (1) create accounts or (2) reset passwords, related to the Special:Userlogin form.
- http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043803.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043856.html
- http://lists.wikimedia.org/pipermail/mediawiki-announce/2010-May/000091.html
- https://bugzilla.wikimedia.org/show_bug.cgi?id=23371
- http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043803.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043856.html
- http://lists.wikimedia.org/pipermail/mediawiki-announce/2010-May/000091.html
- https://bugzilla.wikimedia.org/show_bug.cgi?id=23371
Modified: 2025-04-11
CVE-2011-0003
MediaWiki before 1.16.1, when user or site JavaScript or CSS is enabled, allows remote attackers to conduct clickjacking attacks via unspecified vectors.
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058910.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059232.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059235.html
- http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-January/000093.html
- http://secunia.com/advisories/42810
- http://www.openwall.com/lists/oss-security/2011/01/04/12
- http://www.openwall.com/lists/oss-security/2011/01/04/6
- http://www.osvdb.org/70272
- http://www.vupen.com/english/advisories/2011/0017
- https://bugzilla.wikimedia.org/show_bug.cgi?id=26561
- https://exchange.xforce.ibmcloud.com/vulnerabilities/64476
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058910.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059232.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059235.html
- http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-January/000093.html
- http://secunia.com/advisories/42810
- http://www.openwall.com/lists/oss-security/2011/01/04/12
- http://www.openwall.com/lists/oss-security/2011/01/04/6
- http://www.osvdb.org/70272
- http://www.vupen.com/english/advisories/2011/0017
- https://bugzilla.wikimedia.org/show_bug.cgi?id=26561
- https://exchange.xforce.ibmcloud.com/vulnerabilities/64476
Modified: 2025-04-11
CVE-2011-0047
Cross-site scripting (XSS) vulnerability in MediaWiki before 1.16.2 allows remote attackers to inject arbitrary web script or HTML via crafted Cascading Style Sheets (CSS) comments, aka "CSS injection vulnerability."
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058910.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059232.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059235.html
- http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-February/000095.html
- http://osvdb.org/70770
- http://secunia.com/advisories/43142
- http://www.securityfocus.com/bid/46108
- http://www.vupen.com/english/advisories/2011/0273
- https://bugzilla.wikimedia.org/show_bug.cgi?id=27093
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65126
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058910.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059232.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059235.html
- http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-February/000095.html
- http://osvdb.org/70770
- http://secunia.com/advisories/43142
- http://www.securityfocus.com/bid/46108
- http://www.vupen.com/english/advisories/2011/0273
- https://bugzilla.wikimedia.org/show_bug.cgi?id=27093
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65126
Modified: 2025-04-11
CVE-2011-1579
The checkCss function in includes/Sanitizer.php in the wikitext parser in MediaWiki before 1.16.3 does not properly validate Cascading Style Sheets (CSS) token sequences, which allows remote attackers to conduct cross-site scripting (XSS) attacks or obtain sensitive information by using the \2f\2a and \2a\2f hex strings to surround CSS comments.
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058588.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058910.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059232.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059235.html
- http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-April/000096.html
- http://openwall.com/lists/oss-security/2011/04/13/15
- http://secunia.com/advisories/44142
- http://www.debian.org/security/2011/dsa-2366
- http://www.mediawiki.org/wiki/Special:Code/MediaWiki/85856
- http://www.securityfocus.com/bid/47354
- http://www.vupen.com/english/advisories/2011/0978
- http://www.vupen.com/english/advisories/2011/1100
- http://www.vupen.com/english/advisories/2011/1151
- https://bugzilla.redhat.com/show_bug.cgi?id=695577
- https://bugzilla.redhat.com/show_bug.cgi?id=696360
- https://bugzilla.wikimedia.org/show_bug.cgi?id=28450
- https://exchange.xforce.ibmcloud.com/vulnerabilities/66738
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058588.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058910.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059232.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059235.html
- http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-April/000096.html
- http://openwall.com/lists/oss-security/2011/04/13/15
- http://secunia.com/advisories/44142
- http://www.debian.org/security/2011/dsa-2366
- http://www.mediawiki.org/wiki/Special:Code/MediaWiki/85856
- http://www.securityfocus.com/bid/47354
- http://www.vupen.com/english/advisories/2011/0978
- http://www.vupen.com/english/advisories/2011/1100
- http://www.vupen.com/english/advisories/2011/1151
- https://bugzilla.redhat.com/show_bug.cgi?id=695577
- https://bugzilla.redhat.com/show_bug.cgi?id=696360
- https://bugzilla.wikimedia.org/show_bug.cgi?id=28450
- https://exchange.xforce.ibmcloud.com/vulnerabilities/66738
Modified: 2025-04-11
CVE-2011-1580
The transwiki import functionality in MediaWiki before 1.16.3 does not properly check privileges, which allows remote authenticated users to perform imports from any wgImportSources wiki via a crafted POST request.
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058588.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058910.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059232.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059235.html
- http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-April/000096.html
- http://openwall.com/lists/oss-security/2011/04/13/15
- http://secunia.com/advisories/44142
- http://www.debian.org/security/2011/dsa-2366
- http://www.securityfocus.com/bid/47354
- http://www.vupen.com/english/advisories/2011/0978
- http://www.vupen.com/english/advisories/2011/1100
- http://www.vupen.com/english/advisories/2011/1151
- https://bugzilla.redhat.com/show_bug.cgi?id=695577
- https://bugzilla.redhat.com/show_bug.cgi?id=696360
- https://bugzilla.wikimedia.org/show_bug.cgi?id=28449
- https://exchange.xforce.ibmcloud.com/vulnerabilities/66739
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058588.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058910.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059232.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/059235.html
- http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-April/000096.html
- http://openwall.com/lists/oss-security/2011/04/13/15
- http://secunia.com/advisories/44142
- http://www.debian.org/security/2011/dsa-2366
- http://www.securityfocus.com/bid/47354
- http://www.vupen.com/english/advisories/2011/0978
- http://www.vupen.com/english/advisories/2011/1100
- http://www.vupen.com/english/advisories/2011/1151
- https://bugzilla.redhat.com/show_bug.cgi?id=695577
- https://bugzilla.redhat.com/show_bug.cgi?id=696360
- https://bugzilla.wikimedia.org/show_bug.cgi?id=28449
- https://exchange.xforce.ibmcloud.com/vulnerabilities/66739
Modified: 2025-04-11
CVE-2011-1766
includes/User.php in MediaWiki before 1.16.5, when wgBlockDisablesLogin is enabled, does not clear certain cached data after verification of an auth token fails, which allows remote attackers to bypass authentication by creating crafted wikiUserID and wikiUserName cookies, or by leveraging an unattended workstation.
- http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060435.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060496.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060507.html
- http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-May/000098.html
- http://secunia.com/advisories/44684
- http://www.securityfocus.com/bid/47722
- https://bugzilla.redhat.com/show_bug.cgi?id=702512
- https://bugzilla.wikimedia.org/show_bug.cgi?id=28639
- http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060435.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060496.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060507.html
- http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-May/000098.html
- http://secunia.com/advisories/44684
- http://www.securityfocus.com/bid/47722
- https://bugzilla.redhat.com/show_bug.cgi?id=702512
- https://bugzilla.wikimedia.org/show_bug.cgi?id=28639
Modified: 2025-04-11
CVE-2011-4360
MediaWiki before 1.17.1 allows remote attackers to obtain the page titles of all restricted pages via a series of requests involving the (1) curid or (2) oldid parameter.
- http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-November/000104.html
- http://openwall.com/lists/oss-security/2011/11/29/12
- http://openwall.com/lists/oss-security/2011/11/29/6
- http://www.debian.org/security/2011/dsa-2366
- https://bugzilla.redhat.com/show_bug.cgi?id=758171
- https://bugzilla.wikimedia.org/show_bug.cgi?id=32276
- http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-November/000104.html
- http://openwall.com/lists/oss-security/2011/11/29/12
- http://openwall.com/lists/oss-security/2011/11/29/6
- http://www.debian.org/security/2011/dsa-2366
- https://bugzilla.redhat.com/show_bug.cgi?id=758171
- https://bugzilla.wikimedia.org/show_bug.cgi?id=32276
Modified: 2025-04-11
CVE-2011-4361
MediaWiki before 1.17.1 does not check for read permission before handling action=ajax requests, which allows remote attackers to obtain sensitive information by (1) leveraging the SpecialUpload::ajaxGetExistsWarning function, or by (2) leveraging an extension, as demonstrated by the CategoryTree, ExtTab, and InlineEditor extensions.
- http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-November/000104.html
- http://openwall.com/lists/oss-security/2011/11/29/12
- http://openwall.com/lists/oss-security/2011/11/29/6
- http://www.debian.org/security/2011/dsa-2366
- https://bugzilla.redhat.com/show_bug.cgi?id=758171
- https://bugzilla.wikimedia.org/show_bug.cgi?id=32616
- http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-November/000104.html
- http://openwall.com/lists/oss-security/2011/11/29/12
- http://openwall.com/lists/oss-security/2011/11/29/6
- http://www.debian.org/security/2011/dsa-2366
- https://bugzilla.redhat.com/show_bug.cgi?id=758171
- https://bugzilla.wikimedia.org/show_bug.cgi?id=32616
Modified: 2024-11-21
CVE-2012-0046
mediawiki allows deleted text to be exposed
- https://access.redhat.com/security/cve/cve-2012-0046
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-0046
- https://security-tracker.debian.org/tracker/CVE-2012-0046
- https://access.redhat.com/security/cve/cve-2012-0046
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-0046
- https://security-tracker.debian.org/tracker/CVE-2012-0046
Modified: 2025-04-11
CVE-2012-2698
Cross-site scripting (XSS) vulnerability in the outputPage function in includes/SkinTemplate.php in MediaWiki before 1.17.5, 1.18.x before 1.18.4, and 1.19.x before 1.19.1 allows remote attackers to inject arbitrary web script or HTML via the uselang parameter to index.php/Main_page.
- http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-June/000116.html
- http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-June/000117.html
- http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-June/000118.html
- http://secunia.com/advisories/49484
- http://securitytracker.com/id?1027179
- http://www.openwall.com/lists/oss-security/2012/06/14/2
- http://www.osvdb.org/82983
- https://bugzilla.wikimedia.org/show_bug.cgi?id=36938
- https://exchange.xforce.ibmcloud.com/vulnerabilities/76311
- https://gerrit.wikimedia.org/r/#/c/7979/1/includes/SkinTemplate.php
- https://www.mediawiki.org/wiki/Release_notes/1.17
- https://www.mediawiki.org/wiki/Release_notes/1.18
- https://www.mediawiki.org/wiki/Release_notes/1.19
- http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-June/000116.html
- http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-June/000117.html
- http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-June/000118.html
- http://secunia.com/advisories/49484
- http://securitytracker.com/id?1027179
- http://www.openwall.com/lists/oss-security/2012/06/14/2
- http://www.osvdb.org/82983
- https://bugzilla.wikimedia.org/show_bug.cgi?id=36938
- https://exchange.xforce.ibmcloud.com/vulnerabilities/76311
- https://gerrit.wikimedia.org/r/#/c/7979/1/includes/SkinTemplate.php
- https://www.mediawiki.org/wiki/Release_notes/1.17
- https://www.mediawiki.org/wiki/Release_notes/1.18
- https://www.mediawiki.org/wiki/Release_notes/1.19
Modified: 2025-04-20
CVE-2012-4377
Cross-site scripting (XSS) vulnerability in MediaWiki before 1.18.5 and 1.19.x before 1.19.2 allows remote attackers to inject arbitrary web script or HTML via a File: link to a nonexistent image.
- http://www.openwall.com/lists/oss-security/2012/08/31/10
- http://www.openwall.com/lists/oss-security/2012/08/31/6
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330
- https://bugzilla.redhat.com/show_bug.cgi?id=853409
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2012-August/000119.html
- https://phabricator.wikimedia.org/T41700
- http://www.openwall.com/lists/oss-security/2012/08/31/10
- http://www.openwall.com/lists/oss-security/2012/08/31/6
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330
- https://bugzilla.redhat.com/show_bug.cgi?id=853409
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2012-August/000119.html
- https://phabricator.wikimedia.org/T41700
Modified: 2025-04-20
CVE-2012-4378
Multiple cross-site scripting (XSS) vulnerabilities in MediaWiki before 1.18.5 and 1.19.x before 1.19.2, when unspecified JavaScript gadgets are used, allow remote attackers to inject arbitrary web script or HTML via the userlang parameter to w/index.php.
- http://www.openwall.com/lists/oss-security/2012/08/31/10
- http://www.openwall.com/lists/oss-security/2012/08/31/6
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330
- https://bugzilla.redhat.com/show_bug.cgi?id=853417
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2012-August/000119.html
- https://phabricator.wikimedia.org/T39587
- http://www.openwall.com/lists/oss-security/2012/08/31/10
- http://www.openwall.com/lists/oss-security/2012/08/31/6
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330
- https://bugzilla.redhat.com/show_bug.cgi?id=853417
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2012-August/000119.html
- https://phabricator.wikimedia.org/T39587
Modified: 2025-04-20
CVE-2012-4379
MediaWiki before 1.18.5, and 1.19.x before 1.19.2 does not send a restrictive X-Frame-Options HTTP header, which allows remote attackers to conduct clickjacking attacks via an embedded API response in an IFRAME element.
- http://www.openwall.com/lists/oss-security/2012/08/31/10
- http://www.openwall.com/lists/oss-security/2012/08/31/6
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330
- https://bugzilla.redhat.com/show_bug.cgi?id=853426
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2012-August/000119.html
- https://phabricator.wikimedia.org/T41180
- http://www.openwall.com/lists/oss-security/2012/08/31/10
- http://www.openwall.com/lists/oss-security/2012/08/31/6
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330
- https://bugzilla.redhat.com/show_bug.cgi?id=853426
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2012-August/000119.html
- https://phabricator.wikimedia.org/T41180
Modified: 2025-04-20
CVE-2012-4380
MediaWiki before 1.18.5, and 1.19.x before 1.19.2 allows remote attackers to bypass GlobalBlocking extension IP address blocking and create an account via unspecified vectors.
- http://www.openwall.com/lists/oss-security/2012/08/31/10
- http://www.openwall.com/lists/oss-security/2012/08/31/6
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330
- https://bugzilla.redhat.com/show_bug.cgi?id=853440
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2012-August/000119.html
- https://phabricator.wikimedia.org/T41824
- http://www.openwall.com/lists/oss-security/2012/08/31/10
- http://www.openwall.com/lists/oss-security/2012/08/31/6
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330
- https://bugzilla.redhat.com/show_bug.cgi?id=853440
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2012-August/000119.html
- https://phabricator.wikimedia.org/T41824
Modified: 2024-11-21
CVE-2012-4381
MediaWiki before 1.18.5, and 1.19.x before 1.19.2 saves passwords in the local database, (1) which could make it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack or, (2) when an authentication plugin returns a false in the strict function, could allow remote attackers to use old passwords for non-existing accounts in an external authentication system via unspecified vectors.
- http://osvdb.org/show/osvdb/85106
- http://www.openwall.com/lists/oss-security/2012/08/31/10
- http://www.openwall.com/lists/oss-security/2012/08/31/6
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330
- https://bugzilla.redhat.com/show_bug.cgi?id=853442
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2012-August/000119.html
- https://phabricator.wikimedia.org/T41184
- http://osvdb.org/show/osvdb/85106
- http://www.openwall.com/lists/oss-security/2012/08/31/10
- http://www.openwall.com/lists/oss-security/2012/08/31/6
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330
- https://bugzilla.redhat.com/show_bug.cgi?id=853442
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2012-August/000119.html
- https://phabricator.wikimedia.org/T41184
Modified: 2025-04-20
CVE-2012-4382
MediaWiki before 1.18.5, and 1.19.x before 1.19.2 does not properly protect user block metadata, which allows remote administrators to read a user block reason via a reblock attempt.
- http://www.openwall.com/lists/oss-security/2012/08/31/10
- http://www.openwall.com/lists/oss-security/2012/08/31/6
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2012-August/000119.html
- https://phabricator.wikimedia.org/T41823
- http://www.openwall.com/lists/oss-security/2012/08/31/10
- http://www.openwall.com/lists/oss-security/2012/08/31/6
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2012-August/000119.html
- https://phabricator.wikimedia.org/T41823
Modified: 2025-04-12
CVE-2012-5391
Session fixation vulnerability in Special:UserLogin in MediaWiki before 1.18.6, 1.19.x before 1.19.3, and 1.20.x before 1.20.1 allows remote attackers to hijack web sessions via the session_id.
- http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098975.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100843.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100845.html
- http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-November/000122.html
- https://bugzilla.wikimedia.org/show_bug.cgi?id=40995
- https://exchange.xforce.ibmcloud.com/vulnerabilities/83008
- http://lists.fedoraproject.org/pipermail/package-announce/2013-February/098975.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100843.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-March/100845.html
- http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-November/000122.html
- https://bugzilla.wikimedia.org/show_bug.cgi?id=40995
- https://exchange.xforce.ibmcloud.com/vulnerabilities/83008
Modified: 2025-04-11
CVE-2012-5394
Cross-site request forgery (CSRF) vulnerability in the CentralAuth extension for MediaWiki before 1.19.9, 1.20.x before 1.20.8, and 1.21.x before 1.21.3 allows remote attackers to hijack the authentication of users for requests that login via vectors involving image loading.
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/122998.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123011.html
- http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-November/000135.html
- https://bugzilla.wikimedia.org/show_bug.cgi?id=40747
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/122998.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123011.html
- http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-November/000135.html
- https://bugzilla.wikimedia.org/show_bug.cgi?id=40747
Modified: 2025-04-12
CVE-2012-5395
Session fixation vulnerability in the CentralAuth extension for MediaWiki before 1.18.6, 1.19.x before 1.19.3, and 1.20.x before 1.20.1 allows remote attackers to hijack web sessions via the centralauth_Session cookie.
Modified: 2024-11-21
CVE-2013-1816
MediaWiki before 1.19.4 and 1.20.x before 1.20.3 allows remote attackers to cause a denial of service (application crash) by sending a specially crafted request.
- http://security.gentoo.org/glsa/glsa-201310-21.xml
- http://www.openwall.com/lists/oss-security/2013/03/05/4
- http://www.securityfocus.com/bid/58306
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1816
- https://exchange.xforce.ibmcloud.com/vulnerabilities/88360
- https://security-tracker.debian.org/tracker/CVE-2013-1816
- http://security.gentoo.org/glsa/glsa-201310-21.xml
- http://www.openwall.com/lists/oss-security/2013/03/05/4
- http://www.securityfocus.com/bid/58306
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1816
- https://exchange.xforce.ibmcloud.com/vulnerabilities/88360
- https://security-tracker.debian.org/tracker/CVE-2013-1816
Modified: 2024-11-21
CVE-2013-1817
MediaWiki before 1.19.4 and 1.20.x before 1.20.3 contains an error in the api.php script which allows remote attackers to obtain sensitive information.
- http://security.gentoo.org/glsa/glsa-201310-21.xml
- http://www.openwall.com/lists/oss-security/2013/03/05/4
- http://www.securityfocus.com/bid/58305
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1817
- https://exchange.xforce.ibmcloud.com/vulnerabilities/88359
- https://security-tracker.debian.org/tracker/CVE-2013-1817
- http://security.gentoo.org/glsa/glsa-201310-21.xml
- http://www.openwall.com/lists/oss-security/2013/03/05/4
- http://www.securityfocus.com/bid/58305
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1817
- https://exchange.xforce.ibmcloud.com/vulnerabilities/88359
- https://security-tracker.debian.org/tracker/CVE-2013-1817
Modified: 2025-04-12
CVE-2013-1818
maintenance/mwdoc-filter.php in MediaWiki before 1.20.3 allows remote attackers to read arbitrary files via unspecified vectors.
- http://www.mediawiki.org/wiki/Release_notes/1.20
- http://www.securityfocus.com/bid/58304
- https://bugzilla.wikimedia.org/show_bug.cgi?id=45355
- https://exchange.xforce.ibmcloud.com/vulnerabilities/88363
- http://www.mediawiki.org/wiki/Release_notes/1.20
- http://www.securityfocus.com/bid/58304
- https://bugzilla.wikimedia.org/show_bug.cgi?id=45355
- https://exchange.xforce.ibmcloud.com/vulnerabilities/88363
Modified: 2025-04-11
CVE-2013-2031
MediaWiki before 1.19.6 and 1.20.x before 1.20.5 allows remote attackers to conduct cross-site scripting (XSS) attacks, as demonstrated by a CDATA section containing valid UTF-7 encoded sequences in a SVG file, which is then incorrectly interpreted as UTF-8 by Chrome and Firefox.
- http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105784.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105825.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106293.html
- http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-April/000129.html
- http://secunia.com/advisories/55433
- http://secunia.com/advisories/57472
- http://security.gentoo.org/glsa/glsa-201310-21.xml
- http://www.debian.org/security/2014/dsa-2891
- http://www.openwall.com/lists/oss-security/2013/05/01/2
- http://www.securityfocus.com/bid/59594
- https://bugzilla.wikimedia.org/show_bug.cgi?id=47304
- http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105784.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105825.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106293.html
- http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-April/000129.html
- http://secunia.com/advisories/55433
- http://secunia.com/advisories/57472
- http://security.gentoo.org/glsa/glsa-201310-21.xml
- http://www.debian.org/security/2014/dsa-2891
- http://www.openwall.com/lists/oss-security/2013/05/01/2
- http://www.securityfocus.com/bid/59594
- https://bugzilla.wikimedia.org/show_bug.cgi?id=47304
Modified: 2025-04-11
CVE-2013-2032
MediaWiki before 1.19.6 and 1.20.x before 1.20.5 does not allow extensions to prevent password changes without using both Special:PasswordReset and Special:ChangePassword, which allows remote attackers to bypass the intended restrictions of an extension that only implements one of these blocks.
- http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105784.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105825.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106293.html
- http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-April/000129.html
- http://secunia.com/advisories/55433
- http://security.gentoo.org/glsa/glsa-201310-21.xml
- https://bugzilla.wikimedia.org/show_bug.cgi?id=46590
- http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105784.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105825.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106293.html
- http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-April/000129.html
- http://secunia.com/advisories/55433
- http://security.gentoo.org/glsa/glsa-201310-21.xml
- https://bugzilla.wikimedia.org/show_bug.cgi?id=46590
Modified: 2025-04-11
CVE-2013-4567
Incomplete blacklist vulnerability in Sanitizer::checkCss in MediaWiki before 1.19.9, 1.20.x before 1.20.8, and 1.21.x before 1.21.3 allows remote attackers to conduct cross-site scripting (XSS) attacks via a \b (backspace) character in CSS.
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/122998.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123011.html
- http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-November/000135.html
- http://secunia.com/advisories/57472
- http://www.debian.org/security/2014/dsa-2891
- http://www.securityfocus.com/bid/63760
- https://bugzilla.wikimedia.org/show_bug.cgi?id=55332
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/122998.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123011.html
- http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-November/000135.html
- http://secunia.com/advisories/57472
- http://www.debian.org/security/2014/dsa-2891
- http://www.securityfocus.com/bid/63760
- https://bugzilla.wikimedia.org/show_bug.cgi?id=55332
Modified: 2025-04-11
CVE-2013-4568
Incomplete blacklist vulnerability in Sanitizer::checkCss in MediaWiki before 1.19.9, 1.20.x before 1.20.8, and 1.21.x before 1.21.3 allows remote attackers to conduct cross-site scripting (XSS) attacks via certain non-ASCII characters in CSS, as demonstrated using variations of "expression" containing (1) full width characters or (2) IPA extensions, which are converted and rendered by Internet Explorer.
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/122998.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123011.html
- http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-November/000135.html
- http://secunia.com/advisories/57472
- http://www.debian.org/security/2014/dsa-2891
- http://www.securityfocus.com/bid/63761
- https://bugzilla.wikimedia.org/attachment.cgi?id=13452&action=diff
- https://bugzilla.wikimedia.org/show_bug.cgi?id=55332
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/122998.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123011.html
- http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-November/000135.html
- http://secunia.com/advisories/57472
- http://www.debian.org/security/2014/dsa-2891
- http://www.securityfocus.com/bid/63761
- https://bugzilla.wikimedia.org/attachment.cgi?id=13452&action=diff
- https://bugzilla.wikimedia.org/show_bug.cgi?id=55332
Modified: 2025-04-11
CVE-2013-4569
The CleanChanges extension for MediaWiki before 1.19.9, 1.20.x before 1.20.8, and 1.21.x before 1.21.3, when "Group changes by page in recent changes and watchlist" is enabled, allows remote attackers to obtain sensitive information (revision-deleted IPs) via the Recent Changes page.
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/122998.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123011.html
- http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-November/000135.html
- https://bugzilla.wikimedia.org/show_bug.cgi?id=54294
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/122998.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123011.html
- http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-November/000135.html
- https://bugzilla.wikimedia.org/show_bug.cgi?id=54294
Modified: 2025-04-12
CVE-2013-4570
The zend_inline_hash_func function in php-luasandbox in the Scribuntu extension for MediaWiki before 1.19.10, 1.2x before 1.21.4, and 1.22.x before 1.22.1 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to converting Lua data structures to PHP, as demonstrated by passing { [{}] = 1 } to a module function.
Modified: 2025-04-12
CVE-2013-4571
Buffer overflow in php-luasandbox in the Scribuntu extension for MediaWiki before 1.19.10, 1.2x before 1.21.4, and 1.22.x before 1.22.1 has unspecified impact and remote vectors.
Modified: 2024-11-21
CVE-2013-4572
The CentralNotice extension for MediaWiki before 1.19.9, 1.20.x before 1.20.8, and 1.21.x before 1.21.3 sets the Cache-Control header to cache session cookies when a user is autocreated, which allows remote attackers to authenticate as the created user.
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/122998.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123011.html
- http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-November/000135.html
- https://bugzilla.wikimedia.org/show_bug.cgi?id=53032
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/122998.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123011.html
- http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-November/000135.html
- https://bugzilla.wikimedia.org/show_bug.cgi?id=53032
Modified: 2025-04-12
CVE-2013-4574
Cross-site scripting (XSS) vulnerability in the TimeMediaHandler extension for MediaWiki before 1.19.10, 1.2x before 1.21.4, and 1.22.x before 1.22.1 allows remote attackers to inject arbitrary web script or HTML via vectors related to videos.
Modified: 2025-04-12
CVE-2013-6452
Cross-site scripting (XSS) vulnerability in MediaWiki before 1.19.10, 1.2x before 1.21.4, and 1.22.x before 1.22.1 allows remote attackers to inject arbitrary web script or HTML via crafted XSL in an SVG file.
Modified: 2025-04-12
CVE-2013-6453
MediaWiki before 1.19.10, 1.2x before 1.21.4, and 1.22.x before 1.22.1 does not properly sanitize SVG files, which allows remote attackers to have unspecified impact via invalid XML.
Modified: 2025-04-12
CVE-2013-6454
Cross-site scripting (XSS) vulnerability in MediaWiki before 1.19.10, 1.2x before 1.21.4, and 1.22.x before 1.22.1 allows remote attackers to inject arbitrary web script or HTML via a -o-link attribute.
Modified: 2024-11-21
CVE-2013-6455
The CentralAuth extension for MediaWiki before 1.19.10, 1.2x before 1.21.4, and 1.22.x before 1.22.1 allows remote attackers to obtain usernames via vectors related to writing the names to the DOM of a page.
Modified: 2025-04-12
CVE-2013-6472
MediaWiki before 1.19.10, 1.2x before 1.21.4, and 1.22.x before 1.22.1 allows remote attackers to obtain information about deleted page via the (1) log API, (2) enhanced RecentChanges, and (3) user watchlists.
Modified: 2025-04-12
CVE-2013-7444
The Special:Contributions page in MediaWiki before 1.22.0 allows remote attackers to determine if an IP is autoblocked via the "Change block" text.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165193.html
- http://www.openwall.com/lists/oss-security/2015/08/12/6
- http://www.openwall.com/lists/oss-security/2015/08/27/6
- https://github.com/wikimedia/mediawiki/commit/dc2966bd05b69321300c63fd0bd78e7c78ecea6e
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-August/000179.html
- https://phabricator.wikimedia.org/T48457
- http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165193.html
- http://www.openwall.com/lists/oss-security/2015/08/12/6
- http://www.openwall.com/lists/oss-security/2015/08/27/6
- https://github.com/wikimedia/mediawiki/commit/dc2966bd05b69321300c63fd0bd78e7c78ecea6e
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-August/000179.html
- https://phabricator.wikimedia.org/T48457
Modified: 2025-04-12
CVE-2014-2242
includes/upload/UploadBase.php in MediaWiki before 1.19.12, 1.20.x and 1.21.x before 1.21.6, and 1.22.x before 1.22.3 does not prevent use of invalid namespaces in SVG files, which allows remote attackers to conduct cross-site scripting (XSS) attacks via an SVG upload, as demonstrated by use of a W3C XHTML namespace in conjunction with an IFRAME element.
- http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-February/000141.html
- http://openwall.com/lists/oss-security/2014/02/28/1
- http://openwall.com/lists/oss-security/2014/03/01/2
- http://www.securityfocus.com/bid/65910
- https://bugzilla.redhat.com/show_bug.cgi?id=1071135
- https://bugzilla.wikimedia.org/show_bug.cgi?id=60771
- https://gerrit.wikimedia.org/r/#/q/7d923a6b53f7fbcb0cbc3a19797d741bf6f440eb%2Cn%2Cz
- http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-February/000141.html
- http://openwall.com/lists/oss-security/2014/02/28/1
- http://openwall.com/lists/oss-security/2014/03/01/2
- http://www.securityfocus.com/bid/65910
- https://bugzilla.redhat.com/show_bug.cgi?id=1071135
- https://bugzilla.wikimedia.org/show_bug.cgi?id=60771
- https://gerrit.wikimedia.org/r/#/q/7d923a6b53f7fbcb0cbc3a19797d741bf6f440eb%2Cn%2Cz
Modified: 2025-04-12
CVE-2014-2243
includes/User.php in MediaWiki before 1.19.12, 1.20.x and 1.21.x before 1.21.6, and 1.22.x before 1.22.3 terminates validation of a user token upon encountering the first incorrect character, which makes it easier for remote attackers to obtain access via a brute-force attack that relies on timing differences in responses to incorrect token guesses.
- http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-February/000141.html
- http://openwall.com/lists/oss-security/2014/02/28/1
- http://openwall.com/lists/oss-security/2014/03/01/2
- https://bugzilla.redhat.com/show_bug.cgi?id=1071136
- https://bugzilla.wikimedia.org/show_bug.cgi?id=61346
- https://gerrit.wikimedia.org/r/#/q/I2a9e89120f7092015495e638c6fa9f67adc9b84f%2Cn%2Cz
- http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-February/000141.html
- http://openwall.com/lists/oss-security/2014/02/28/1
- http://openwall.com/lists/oss-security/2014/03/01/2
- https://bugzilla.redhat.com/show_bug.cgi?id=1071136
- https://bugzilla.wikimedia.org/show_bug.cgi?id=61346
- https://gerrit.wikimedia.org/r/#/q/I2a9e89120f7092015495e638c6fa9f67adc9b84f%2Cn%2Cz
Modified: 2025-04-12
CVE-2014-2244
Cross-site scripting (XSS) vulnerability in the formatHTML function in includes/api/ApiFormatBase.php in MediaWiki before 1.19.12, 1.20.x and 1.21.x before 1.21.6, and 1.22.x before 1.22.3 allows remote attackers to inject arbitrary web script or HTML via a crafted string located after http:// in the text parameter to api.php.
- http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-February/000141.html
- http://openwall.com/lists/oss-security/2014/02/28/1
- http://openwall.com/lists/oss-security/2014/03/01/2
- http://www.securityfocus.com/bid/65906
- https://bugzilla.redhat.com/show_bug.cgi?id=1071139
- https://bugzilla.wikimedia.org/show_bug.cgi?id=61362
- https://gerrit.wikimedia.org/r/#/q/Idf985e4e69c2f11778a8a90503914678441cb3fb%2Cn%2Cz
- http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-February/000141.html
- http://openwall.com/lists/oss-security/2014/02/28/1
- http://openwall.com/lists/oss-security/2014/03/01/2
- http://www.securityfocus.com/bid/65906
- https://bugzilla.redhat.com/show_bug.cgi?id=1071139
- https://bugzilla.wikimedia.org/show_bug.cgi?id=61362
- https://gerrit.wikimedia.org/r/#/q/Idf985e4e69c2f11778a8a90503914678441cb3fb%2Cn%2Cz
Modified: 2025-04-12
CVE-2014-3454
Cross-site request forgery (CSRF) vulnerability in Special:CreateCategory in the SemanticForms extension for MediaWiki before 1.19.10, 1.2x before 1.21.4, and 1.22.x before 1.22.1 allows remote attackers to hijack the authentication of users for requests that create categories via unspecified vectors.
Modified: 2025-04-12
CVE-2014-3455
Multiple cross-site request forgery (CSRF) vulnerabilities in the (1) CreateProperty, (2) CreateTemplate, (3) CreateForm, and (4) CreateClass special pages in the SemanticForms extension for MediaWiki before 1.19.10, 1.2x before 1.21.4, and 1.22.x before 1.22.1 allow remote attackers to hijack the authentication of users for requests that have unspecified impact and vectors.
Closed bugs
Добавить зависимость на php5-dom
Некорректный mediawiki.ini