ALT-PU-2015-1935-1
Closed vulnerabilities
Modified: 2025-04-12
CVE-2015-2931
Incomplete blacklist vulnerability in includes/upload/UploadBase.php in MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2 allows remote attackers to inject arbitrary web script or HTML via an application/xml MIME type for a nested SVG with a data: URI.
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:200
- http://www.openwall.com/lists/oss-security/2015/04/01/1
- http://www.openwall.com/lists/oss-security/2015/04/07/3
- http://www.securityfocus.com/bid/73477
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html
- https://phabricator.wikimedia.org/T85850
- https://security.gentoo.org/glsa/201510-05
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:200
- http://www.openwall.com/lists/oss-security/2015/04/01/1
- http://www.openwall.com/lists/oss-security/2015/04/07/3
- http://www.securityfocus.com/bid/73477
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html
- https://phabricator.wikimedia.org/T85850
- https://security.gentoo.org/glsa/201510-05
Modified: 2025-04-12
CVE-2015-2932
Incomplete blacklist vulnerability in MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2 allows remote attackers to inject arbitrary web script or HTML via an animated href XLink element.
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:200
- http://www.openwall.com/lists/oss-security/2015/04/01/1
- http://www.openwall.com/lists/oss-security/2015/04/07/3
- http://www.securityfocus.com/bid/73477
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html
- https://phabricator.wikimedia.org/T86711
- https://security.gentoo.org/glsa/201510-05
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:200
- http://www.openwall.com/lists/oss-security/2015/04/01/1
- http://www.openwall.com/lists/oss-security/2015/04/07/3
- http://www.securityfocus.com/bid/73477
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html
- https://phabricator.wikimedia.org/T86711
- https://security.gentoo.org/glsa/201510-05
Modified: 2025-04-12
CVE-2015-2933
Cross-site scripting (XSS) vulnerability in the Html class in MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2 allows remote attackers to inject arbitrary web script or HTML via a LanguageConverter substitution string when using a language variant.
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:200
- http://www.openwall.com/lists/oss-security/2015/04/01/1
- http://www.openwall.com/lists/oss-security/2015/04/07/3
- http://www.securityfocus.com/bid/73477
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html
- https://phabricator.wikimedia.org/T73394
- https://security.gentoo.org/glsa/201510-05
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:200
- http://www.openwall.com/lists/oss-security/2015/04/01/1
- http://www.openwall.com/lists/oss-security/2015/04/07/3
- http://www.securityfocus.com/bid/73477
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html
- https://phabricator.wikimedia.org/T73394
- https://security.gentoo.org/glsa/201510-05
Modified: 2025-04-12
CVE-2015-2934
MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2 does not properly handle when the Zend interpreter xml_parse function does not expand entities, which allows remote attackers to inject arbitrary web script or HTML via a crafted SVG file.
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:200
- http://www.openwall.com/lists/oss-security/2015/04/01/1
- http://www.openwall.com/lists/oss-security/2015/04/07/3
- http://www.securityfocus.com/bid/73477
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html
- https://phabricator.wikimedia.org/T88310
- https://security.gentoo.org/glsa/201510-05
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:200
- http://www.openwall.com/lists/oss-security/2015/04/01/1
- http://www.openwall.com/lists/oss-security/2015/04/07/3
- http://www.securityfocus.com/bid/73477
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html
- https://phabricator.wikimedia.org/T88310
- https://security.gentoo.org/glsa/201510-05
Modified: 2025-04-12
CVE-2015-2935
MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2 allows remote attackers to bypass the SVG filtering and obtain sensitive user information via a mixed case @import in a style element in an SVG file, as demonstrated by "@imporT."
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:200
- http://www.openwall.com/lists/oss-security/2015/04/01/1
- http://www.openwall.com/lists/oss-security/2015/04/07/3
- http://www.securityfocus.com/bid/73477
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html
- https://phabricator.wikimedia.org/T85349
- https://security.gentoo.org/glsa/201510-05
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:200
- http://www.openwall.com/lists/oss-security/2015/04/01/1
- http://www.openwall.com/lists/oss-security/2015/04/07/3
- http://www.securityfocus.com/bid/73477
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html
- https://phabricator.wikimedia.org/T85349
- https://security.gentoo.org/glsa/201510-05
Modified: 2025-04-12
CVE-2015-2937
MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2, when using HHVM or Zend PHP, allows remote attackers to cause a denial of service ("quadratic blowup" and memory consumption) via an XML file containing an entity declaration with long replacement text and many references to this entity, a different vulnerability than CVE-2015-2942.
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:200
- http://www.openwall.com/lists/oss-security/2015/04/01/1
- http://www.openwall.com/lists/oss-security/2015/04/07/3
- http://www.securityfocus.com/bid/73477
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html
- https://phabricator.wikimedia.org/T71210
- https://security.gentoo.org/glsa/201510-05
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:200
- http://www.openwall.com/lists/oss-security/2015/04/01/1
- http://www.openwall.com/lists/oss-security/2015/04/07/3
- http://www.securityfocus.com/bid/73477
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html
- https://phabricator.wikimedia.org/T71210
- https://security.gentoo.org/glsa/201510-05
Modified: 2025-04-12
CVE-2015-2938
Cross-site scripting (XSS) vulnerability in MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2 allows remote attackers to inject arbitrary web script or HTML via a custom JavaScript file, which is not properly handled when previewing the file.
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:200
- http://www.openwall.com/lists/oss-security/2015/04/01/1
- http://www.openwall.com/lists/oss-security/2015/04/07/3
- http://www.securityfocus.com/bid/73477
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html
- https://phabricator.wikimedia.org/T85855
- https://security.gentoo.org/glsa/201510-05
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:200
- http://www.openwall.com/lists/oss-security/2015/04/01/1
- http://www.openwall.com/lists/oss-security/2015/04/07/3
- http://www.securityfocus.com/bid/73477
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html
- https://phabricator.wikimedia.org/T85855
- https://security.gentoo.org/glsa/201510-05
Modified: 2025-04-12
CVE-2015-2941
Cross-site scripting (XSS) vulnerability in MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2, when using HHVM, allows remote attackers to inject arbitrary web script or HTML via an invalid parameter in a wddx format request to api.php, which is not properly handled in an error message, related to unsafe calls to wddx_serialize_value.
- http://www.openwall.com/lists/oss-security/2015/04/01/1
- http://www.openwall.com/lists/oss-security/2015/04/07/3
- http://www.securityfocus.com/bid/73477
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html
- https://phabricator.wikimedia.org/T85851
- https://security.gentoo.org/glsa/201510-05
- http://www.openwall.com/lists/oss-security/2015/04/01/1
- http://www.openwall.com/lists/oss-security/2015/04/07/3
- http://www.securityfocus.com/bid/73477
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html
- https://phabricator.wikimedia.org/T85851
- https://security.gentoo.org/glsa/201510-05
Modified: 2025-04-12
CVE-2015-2942
MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2, when using HHVM, allows remote attackers to cause a denial of service (CPU and memory consumption) via a large number of nested entity references in an (1) SVG file or (2) XMP metadata in a PDF file, aka a "billion laughs attack," a different vulnerability than CVE-2015-2937.
- http://www.openwall.com/lists/oss-security/2015/04/01/1
- http://www.openwall.com/lists/oss-security/2015/04/07/3
- http://www.securityfocus.com/bid/73477
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html
- https://phabricator.wikimedia.org/T85848
- https://security.gentoo.org/glsa/201510-05
- http://www.openwall.com/lists/oss-security/2015/04/01/1
- http://www.openwall.com/lists/oss-security/2015/04/07/3
- http://www.securityfocus.com/bid/73477
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html
- https://phabricator.wikimedia.org/T85848
- https://security.gentoo.org/glsa/201510-05
Modified: 2025-04-12
CVE-2015-6727
The Special:DeletedContributions page in MediaWiki before 1.23.10, 1.24.x before 1.24.3, and 1.25.x before 1.25.2 allows remote attackers to determine if an IP is autoblocked via the "Change block" text.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165193.html
- http://www.openwall.com/lists/oss-security/2015/08/12/6
- http://www.openwall.com/lists/oss-security/2015/08/27/6
- https://github.com/wikimedia/mediawiki/commit/5faabfa1bbf65536ea36108887040198afcb3c82
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-August/000179.html
- https://phabricator.wikimedia.org/T106893
- http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165193.html
- http://www.openwall.com/lists/oss-security/2015/08/12/6
- http://www.openwall.com/lists/oss-security/2015/08/27/6
- https://github.com/wikimedia/mediawiki/commit/5faabfa1bbf65536ea36108887040198afcb3c82
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-August/000179.html
- https://phabricator.wikimedia.org/T106893
Modified: 2025-04-12
CVE-2015-6728
The ApiBase::getWatchlistUser function in MediaWiki before 1.23.10, 1.24.x before 1.24.3, and 1.25.x before 1.25.2 does not perform token comparison in constant time, which allows remote attackers to guess the watchlist token and bypass CSRF protection via a timing attack.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165193.html
- http://www.openwall.com/lists/oss-security/2015/08/12/6
- http://www.openwall.com/lists/oss-security/2015/08/27/6
- http://www.securityfocus.com/bid/76334
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-August/000179.html
- https://security.gentoo.org/glsa/201510-05
- http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165193.html
- http://www.openwall.com/lists/oss-security/2015/08/12/6
- http://www.openwall.com/lists/oss-security/2015/08/27/6
- http://www.securityfocus.com/bid/76334
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-August/000179.html
- https://security.gentoo.org/glsa/201510-05
Modified: 2025-04-12
CVE-2015-6729
Cross-site scripting (XSS) vulnerability in thumb.php in MediaWiki before 1.23.10, 1.24.x before 1.24.3, and 1.25.x before 1.25.2 allows remote attackers to inject arbitrary web script or HTML via the rel404 parameter, which is not properly handled in an error page.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165193.html
- http://www.openwall.com/lists/oss-security/2015/08/12/6
- http://www.openwall.com/lists/oss-security/2015/08/27/6
- http://www.securityfocus.com/bid/76334
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-August/000179.html
- https://security.gentoo.org/glsa/201510-05
- http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165193.html
- http://www.openwall.com/lists/oss-security/2015/08/12/6
- http://www.openwall.com/lists/oss-security/2015/08/27/6
- http://www.securityfocus.com/bid/76334
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-August/000179.html
- https://security.gentoo.org/glsa/201510-05
Modified: 2025-04-12
CVE-2015-6730
Cross-site scripting (XSS) vulnerability in thumb.php in MediaWiki before 1.23.10, 1.24.x before 1.24.3, and 1.25.x before 1.25.2 allows remote attackers to inject arbitrary web script or HTML via the f parameter, which is not properly handled in an error page, related to "ForeignAPI images."
- http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165193.html
- http://www.openwall.com/lists/oss-security/2015/08/12/6
- http://www.openwall.com/lists/oss-security/2015/08/27/6
- http://www.securityfocus.com/bid/76334
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-August/000179.html
- https://security.gentoo.org/glsa/201510-05
- http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165193.html
- http://www.openwall.com/lists/oss-security/2015/08/12/6
- http://www.openwall.com/lists/oss-security/2015/08/27/6
- http://www.securityfocus.com/bid/76334
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-August/000179.html
- https://security.gentoo.org/glsa/201510-05
Modified: 2025-04-12
CVE-2015-6733
GeSHi, as used in the SyntaxHighlight_GeSHi extension and MediaWiki before 1.23.10, 1.24.x before 1.24.3, and 1.25.x before 1.25.2, allows remote attackers to cause a denial of service (resource consumption) via unspecified vectors.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165193.html
- http://www.openwall.com/lists/oss-security/2015/08/12/6
- http://www.openwall.com/lists/oss-security/2015/08/27/6
- http://www.securityfocus.com/bid/76361
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-August/000179.html
- https://phabricator.wikimedia.org/T101608
- https://security.gentoo.org/glsa/201510-05
- http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165193.html
- http://www.openwall.com/lists/oss-security/2015/08/12/6
- http://www.openwall.com/lists/oss-security/2015/08/27/6
- http://www.securityfocus.com/bid/76361
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-August/000179.html
- https://phabricator.wikimedia.org/T101608
- https://security.gentoo.org/glsa/201510-05
Modified: 2025-04-12
CVE-2015-6734
Cross-site scripting (XSS) vulnerability in contrib/cssgen.php in the GeSHi, as used in the SyntaxHighlight_GeSHi extension and MediaWiki before 1.23.10, 1.24.x before 1.24.3, and 1.25.x before 1.25.2, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165193.html
- http://www.openwall.com/lists/oss-security/2015/08/12/6
- http://www.openwall.com/lists/oss-security/2015/08/27/6
- http://www.securityfocus.com/bid/76361
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-August/000179.html
- https://phabricator.wikimedia.org/T108198
- https://security.gentoo.org/glsa/201510-05
- http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165193.html
- http://www.openwall.com/lists/oss-security/2015/08/12/6
- http://www.openwall.com/lists/oss-security/2015/08/27/6
- http://www.securityfocus.com/bid/76361
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-August/000179.html
- https://phabricator.wikimedia.org/T108198
- https://security.gentoo.org/glsa/201510-05
Modified: 2025-04-12
CVE-2015-8001
The chunked upload API (ApiUpload) in MediaWiki before 1.23.11, 1.24.x before 1.24.4, and 1.25.x before 1.25.3 does not restrict the uploaded data to the claimed file size, which allows remote authenticated users to cause a denial of service via a chunk that exceeds the file size.
- http://www.securitytracker.com/id/1034028
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-October/000181.html
- https://phabricator.wikimedia.org/T91203
- http://www.securitytracker.com/id/1034028
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-October/000181.html
- https://phabricator.wikimedia.org/T91203
Modified: 2025-04-12
CVE-2015-8002
The chunked upload API (ApiUpload) in MediaWiki before 1.23.11, 1.24.x before 1.24.4, and 1.25.x before 1.25.3 allows remote authenticated users to cause a denial of service (disk consumption) via a file upload using one byte chunks.
- http://www.securitytracker.com/id/1034028
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-October/000181.html
- https://phabricator.wikimedia.org/T91205
- http://www.securitytracker.com/id/1034028
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-October/000181.html
- https://phabricator.wikimedia.org/T91205
Modified: 2025-04-12
CVE-2015-8003
MediaWiki before 1.23.11, 1.24.x before 1.24.4, and 1.25.x before 1.25.3 does not throttle file uploads, which allows remote authenticated users to have unspecified impact via multiple file uploads.
- http://www.securitytracker.com/id/1034028
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-October/000181.html
- https://phabricator.wikimedia.org/T91850
- http://www.securitytracker.com/id/1034028
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-October/000181.html
- https://phabricator.wikimedia.org/T91850
Modified: 2025-04-12
CVE-2015-8004
MediaWiki before 1.23.11, 1.24.x before 1.24.4, and 1.25.x before 1.25.3 does not properly restrict access to revisions, which allows remote authenticated users with the viewsuppressed user right to remove revision suppressions via a crafted revisiondelete action, which returns a valid a change form.
- http://www.securitytracker.com/id/1034028
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-October/000181.html
- https://phabricator.wikimedia.org/T95589
- http://www.securitytracker.com/id/1034028
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-October/000181.html
- https://phabricator.wikimedia.org/T95589
Modified: 2025-04-12
CVE-2015-8005
MediaWiki before 1.23.11, 1.24.x before 1.24.4, and 1.25.x before 1.25.3 uses the thumbnail ImageMagick command line argument, which allows remote attackers to obtain the installation path by reading the metadata of a PNG thumbnail file.
- http://www.securitytracker.com/id/1034028
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-October/000181.html
- https://phabricator.wikimedia.org/T108616
- http://www.securitytracker.com/id/1034028
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-October/000181.html
- https://phabricator.wikimedia.org/T108616
Modified: 2025-04-20
CVE-2015-8009
The MWOAuthDataStore::lookup_token function in Extension:OAuth for MediaWiki 1.25.x before 1.25.3, 1.24.x before 1.24.4, and before 1.23.11 does not properly validate the signature when checking the authorization signature, which allows remote registered Consumers to use another Consumer's credentials by leveraging knowledge of the credentials.