vuln-list-alt/oval/p11/ALT-PU-2017-2095/definitions.json
2024-12-12 21:07:30 +00:00

535 lines
27 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20172095",
"Version": "oval:org.altlinux.errata:def:20172095",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2017-2095: package `mediawiki` update to version 1.29.0-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p11"
],
"Products": [
"ALT Container"
]
}
],
"References": [
{
"RefID": "ALT-PU-2017-2095",
"RefURL": "https://errata.altlinux.org/ALT-PU-2017-2095",
"Source": "ALTPU"
},
{
"RefID": "BDU:2019-03563",
"RefURL": "https://bdu.fstec.ru/vul/2019-03563",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03621",
"RefURL": "https://bdu.fstec.ru/vul/2019-03621",
"Source": "BDU"
},
{
"RefID": "BDU:2020-02564",
"RefURL": "https://bdu.fstec.ru/vul/2020-02564",
"Source": "BDU"
},
{
"RefID": "CVE-2014-9481",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-9481",
"Source": "CVE"
},
{
"RefID": "CVE-2015-8008",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8008",
"Source": "CVE"
},
{
"RefID": "CVE-2015-8622",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8622",
"Source": "CVE"
},
{
"RefID": "CVE-2015-8623",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8623",
"Source": "CVE"
},
{
"RefID": "CVE-2015-8624",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8624",
"Source": "CVE"
},
{
"RefID": "CVE-2015-8625",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8625",
"Source": "CVE"
},
{
"RefID": "CVE-2015-8626",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8626",
"Source": "CVE"
},
{
"RefID": "CVE-2015-8627",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8627",
"Source": "CVE"
},
{
"RefID": "CVE-2015-8628",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8628",
"Source": "CVE"
},
{
"RefID": "CVE-2016-6331",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-6331",
"Source": "CVE"
},
{
"RefID": "CVE-2016-6332",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-6332",
"Source": "CVE"
},
{
"RefID": "CVE-2016-6333",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-6333",
"Source": "CVE"
},
{
"RefID": "CVE-2016-6334",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-6334",
"Source": "CVE"
},
{
"RefID": "CVE-2016-6335",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-6335",
"Source": "CVE"
},
{
"RefID": "CVE-2016-6336",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-6336",
"Source": "CVE"
},
{
"RefID": "CVE-2017-0361",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-0361",
"Source": "CVE"
},
{
"RefID": "CVE-2017-0362",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-0362",
"Source": "CVE"
},
{
"RefID": "CVE-2017-0363",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-0363",
"Source": "CVE"
},
{
"RefID": "CVE-2017-0364",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-0364",
"Source": "CVE"
},
{
"RefID": "CVE-2017-0365",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-0365",
"Source": "CVE"
},
{
"RefID": "CVE-2017-0366",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-0366",
"Source": "CVE"
},
{
"RefID": "CVE-2017-0368",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-0368",
"Source": "CVE"
},
{
"RefID": "CVE-2017-0369",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-0369",
"Source": "CVE"
},
{
"RefID": "CVE-2017-0370",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-0370",
"Source": "CVE"
},
{
"RefID": "CVE-2017-0371",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-0371",
"Source": "CVE"
},
{
"RefID": "CVE-2017-0372",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-0372",
"Source": "CVE"
},
{
"RefID": "CVE-2019-12467",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-12467",
"Source": "CVE"
},
{
"RefID": "CVE-2019-12472",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-12472",
"Source": "CVE"
},
{
"RefID": "CVE-2019-12474",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-12474",
"Source": "CVE"
}
],
"Description": "This update upgrades mediawiki to version 1.29.0-alt1. \nSecurity Fix(es):\n\n * BDU:2019-03563: Уязвимость функции Special:ChangeEmail программного средства для реализации гипертекстовой среды MediaWiki, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2019-03621: Уязвимость программного средства для реализации гипертекстовой среды MediaWiki, связанная с недостатками контроля доступа, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-02564: Уязвимость программного средства для реализации гипертекстовой среды MediaWiki, связанная с передачей недопустимых заголовков в API, позволяющая нарушителю несанкционированный доступ к защищаемой информации\n\n * CVE-2014-9481: The Scribunto extension for MediaWiki allows remote attackers to obtain the rollback token and possibly other sensitive information via a crafted module, related to unstripping special page HTML.\n\n * CVE-2015-8008: The OAuth extension for MediaWiki improperly negotiates a new client token only over Special:OAuth/initiate, which allows attackers to bypass intended IP address access restrictions by making an API request with an existing token.\n\n * CVE-2015-8622: Cross-site scripting (XSS) vulnerability in MediaWiki before 1.23.12, 1.24.x before 1.24.5, 1.25.x before 1.25.4, and 1.26.x before 1.26.1, when is configured with a relative URL, allows remote authenticated users to inject arbitrary web script or HTML via wikitext, as demonstrated by a wikilink to a page named \"javascript:alert('XSS!').\"\n\n * CVE-2015-8623: The User::matchEditToken function in includes/User.php in MediaWiki before 1.23.12 and 1.24.x before 1.24.5 does not perform token comparison in constant time before returning, which allows remote attackers to guess the edit token and bypass CSRF protection via a timing attack, a different vulnerability than CVE-2015-8624.\n\n * CVE-2015-8624: The User::matchEditToken function in includes/User.php in MediaWiki before 1.23.12, 1.24.x before 1.24.5, 1.25.x before 1.25.4, and 1.26.x before 1.26.1 does not perform token comparison in constant time before determining if a debugging message should be logged, which allows remote attackers to guess the edit token and bypass CSRF protection via a timing attack, a different vulnerability than CVE-2015-8623.\n\n * CVE-2015-8625: MediaWiki before 1.23.12, 1.24.x before 1.24.5, 1.25.x before 1.25.4, and 1.26.x before 1.26.1 do not properly sanitize parameters when calling the cURL library, which allows remote attackers to read arbitrary files via an @ (at sign) character in unspecified POST array parameters.\n\n * CVE-2015-8626: The User::randomPassword function in MediaWiki before 1.23.12, 1.24.x before 1.24.5, 1.25.x before 1.25.4, and 1.26.x before 1.26.1 generates passwords smaller than $wgMinimalPasswordLength, which makes it easier for remote attackers to obtain access via a brute-force attack.\n\n * CVE-2015-8627: MediaWiki before 1.23.12, 1.24.x before 1.24.5, 1.25.x before 1.25.4, and 1.26.x before 1.26.1 do not properly normalize IP addresses containing zero-padded octets, which might allow remote attackers to bypass intended access restrictions by using an IP address that was not supposed to have been allowed.\n\n * CVE-2015-8628: The (1) Special:MyPage, (2) Special:MyTalk, (3) Special:MyContributions, (4) Special:MyUploads, and (5) Special:AllMyUploads pages in MediaWiki before 1.23.12, 1.24.x before 1.24.5, 1.25.x before 1.25.4, and 1.26.x before 1.26.1 allow remote attackers to obtain sensitive user login information via crafted links combined with page view statistics.\n\n * CVE-2016-6331: ApiParse in MediaWiki before 1.23.15, 1.26.x before 1.26.4, and 1.27.x before 1.27.1 allows remote attackers to bypass intended per-title read restrictions via a parse action to api.php.\n\n * CVE-2016-6332: MediaWiki before 1.23.15, 1.26.x before 1.26.4, and 1.27.x before 1.27.1, when $wgBlockDisablesLogin is true, might allow remote attackers to obtain sensitive information by leveraging failure to terminate sessions when a user account is blocked.\n\n * CVE-2016-6333: Cross-site scripting (XSS) vulnerability in the CSS user subpage preview feature in MediaWiki before 1.23.15, 1.26.x before 1.26.4, and 1.27.x before 1.27.1 allows remote attackers to inject arbitrary web script or HTML via the edit box in Special:MyPage/common.css.\n\n * CVE-2016-6334: Cross-site scripting (XSS) vulnerability in the Parser::replaceInternalLinks2 method in MediaWiki before 1.23.15, 1.26.x before 1.26.4, and 1.27.x before 1.27.1 allows remote attackers to inject arbitrary web script or HTML via vectors involving replacement of percent encoding in unclosed internal links.\n\n * CVE-2016-6335: MediaWiki before 1.23.15, 1.26.x before 1.26.4, and 1.27.x before 1.27.1 does not generate head items in the context of a given title, which allows remote attackers to obtain sensitive information via a parse action to api.php.\n\n * CVE-2016-6336: MediaWiki before 1.23.15, 1.26.x before 1.26.4, and 1.27.x before 1.27.1 allows remote authenticated users with undelete permissions to bypass intended suppressrevision and deleterevision restrictions and remove the revision deletion status of arbitrary file revisions by using Special:Undelete.\n\n * CVE-2017-0361: Mediawiki before 1.28.1 / 1.27.2 / 1.23.16 contains an information disclosure flaw, where the api.log might contain passwords in plaintext.\n\n * CVE-2017-0362: Mediawiki before 1.28.1 / 1.27.2 / 1.23.16 contains a flaw where the \"Mark all pages visited\" on the watchlist does not require a CSRF token.\n\n * CVE-2017-0363: Mediawiki before 1.28.1 / 1.27.2 / 1.23.16 has a flaw where Special:UserLogin?returnto=interwiki:foo will redirect to external sites.\n\n * CVE-2017-0364: Mediawiki before 1.28.1 / 1.27.2 / 1.23.16 contains a flaw where Special:Search allows redirects to any interwiki link.\n\n * CVE-2017-0365: Mediawiki before 1.28.1 / 1.27.2 / 1.23.16 contains a XSS vulnerability in SearchHighlighter::highlightText() with non-default configurations.\n\n * CVE-2017-0366: Mediawiki before 1.28.1 / 1.27.2 / 1.23.16 contains a flaw allowing to evade SVG filter using default attribute values in DTD declaration.\n\n * CVE-2017-0368: Mediawiki before 1.28.1 / 1.27.2 / 1.23.16 contains a flaw making rawHTML mode apply to system messages.\n\n * CVE-2017-0369: Mediawiki before 1.28.1 / 1.27.2 / 1.23.16 contains a flaw, allowing a sysops to undelete pages, although the page is protected against it.\n\n * CVE-2017-0370: Mediawiki before 1.28.1 / 1.27.2 / 1.23.16 contains a flaw were Spam blacklist is ineffective on encoded URLs inside file inclusion syntax's link parameter.\n\n * CVE-2017-0371: MediaWiki before 1.23.16, 1.24.x through 1.27.x before 1.27.2, and 1.28.x before 1.28.1 allows remote attackers to discover the IP addresses of Wiki visitors via a style=\"background-image: attr(title url);\" attack within a DIV element that has an attacker-controlled URL in the title attribute.\n\n * CVE-2017-0372: Parameters injection in the SyntaxHighlight extension of Mediawiki before 1.23.16, 1.27.3 and 1.28.2 might result in multiple vulnerabilities.\n\n * CVE-2019-12467: MediaWiki through 1.32.1 has Incorrect Access Control (issue 1 of 3). A spammer can use Special:ChangeEmail to send out spam with no rate limiting or ability to block them. Fixed in 1.32.2, 1.31.2, 1.30.2 and 1.27.6.\n\n * CVE-2019-12472: An Incorrect Access Control vulnerability was found in Wikimedia MediaWiki 1.18.0 through 1.32.1. It is possible to bypass the limits on IP range blocks ($wgBlockCIDRLimit) by using the API. Fixed in 1.32.2, 1.31.2, 1.30.2 and 1.27.6.\n\n * CVE-2019-12474: Wikimedia MediaWiki 1.23.0 through 1.32.1 has an information leak. Privileged API responses that include whether a recent change has been patrolled may be cached publicly. Fixed in 1.32.2, 1.31.2, 1.30.2 and 1.27.6.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2017-08-22"
},
"Updated": {
"Date": "2017-08-22"
},
"BDUs": [
{
"ID": "BDU:2019-03563",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-284",
"Href": "https://bdu.fstec.ru/vul/2019-03563",
"Impact": "Low",
"Public": "20181118"
},
{
"ID": "BDU:2019-03621",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"CWE": "CWE-284",
"Href": "https://bdu.fstec.ru/vul/2019-03621",
"Impact": "High",
"Public": "20190710"
},
{
"ID": "BDU:2020-02564",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2020-02564",
"Impact": "High",
"Public": "20190710"
}
],
"CVEs": [
{
"ID": "CVE-2014-9481",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-9481",
"Impact": "Low",
"Public": "20200127"
},
{
"ID": "CVE-2015-8008",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-284",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8008",
"Impact": "High",
"Public": "20171229"
},
{
"ID": "CVE-2015-8622",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8622",
"Impact": "Low",
"Public": "20170323"
},
{
"ID": "CVE-2015-8623",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-352",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8623",
"Impact": "High",
"Public": "20170323"
},
{
"ID": "CVE-2015-8624",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-352",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8624",
"Impact": "High",
"Public": "20170323"
},
{
"ID": "CVE-2015-8625",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8625",
"Impact": "High",
"Public": "20170323"
},
{
"ID": "CVE-2015-8626",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-255",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8626",
"Impact": "Critical",
"Public": "20170323"
},
{
"ID": "CVE-2015-8627",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-284",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8627",
"Impact": "Low",
"Public": "20170323"
},
{
"ID": "CVE-2015-8628",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8628",
"Impact": "Low",
"Public": "20170323"
},
{
"ID": "CVE-2016-6331",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-284",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-6331",
"Impact": "High",
"Public": "20170420"
},
{
"ID": "CVE-2016-6332",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-6332",
"Impact": "High",
"Public": "20170420"
},
{
"ID": "CVE-2016-6333",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-6333",
"Impact": "Low",
"Public": "20170420"
},
{
"ID": "CVE-2016-6334",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-6334",
"Impact": "Low",
"Public": "20170420"
},
{
"ID": "CVE-2016-6335",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-6335",
"Impact": "High",
"Public": "20170420"
},
{
"ID": "CVE-2016-6336",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"CWE": "CWE-284",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-6336",
"Impact": "Low",
"Public": "20170420"
},
{
"ID": "CVE-2017-0361",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-0361",
"Impact": "High",
"Public": "20180413"
},
{
"ID": "CVE-2017-0362",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-352",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-0362",
"Impact": "High",
"Public": "20180413"
},
{
"ID": "CVE-2017-0363",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-601",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-0363",
"Impact": "Low",
"Public": "20180413"
},
{
"ID": "CVE-2017-0364",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-601",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-0364",
"Impact": "Low",
"Public": "20180413"
},
{
"ID": "CVE-2017-0365",
"CVSS": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-0365",
"Impact": "Low",
"Public": "20180413"
},
{
"ID": "CVE-2017-0366",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-0366",
"Impact": "Low",
"Public": "20180413"
},
{
"ID": "CVE-2017-0368",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-0368",
"Impact": "Low",
"Public": "20180413"
},
{
"ID": "CVE-2017-0369",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"CWE": "CWE-276",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-0369",
"Impact": "Low",
"Public": "20180413"
},
{
"ID": "CVE-2017-0370",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-0370",
"Impact": "Low",
"Public": "20180413"
},
{
"ID": "CVE-2017-0371",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-0371",
"Impact": "High",
"Public": "20220218"
},
{
"ID": "CVE-2017-0372",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-74",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-0372",
"Impact": "Critical",
"Public": "20180413"
},
{
"ID": "CVE-2019-12467",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-12467",
"Impact": "Low",
"Public": "20190710"
},
{
"ID": "CVE-2019-12472",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-12472",
"Impact": "High",
"Public": "20190710"
},
{
"ID": "CVE-2019-12474",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-12474",
"Impact": "High",
"Public": "20190710"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:container:11"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20172095001",
"Comment": "mediawiki is earlier than 0:1.29.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172095002",
"Comment": "mediawiki-apache2 is earlier than 0:1.29.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172095003",
"Comment": "mediawiki-common is earlier than 0:1.29.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172095004",
"Comment": "mediawiki-mysql is earlier than 0:1.29.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172095005",
"Comment": "mediawiki-postgresql is earlier than 0:1.29.0-alt1"
}
]
}
]
}
}
]
}