360 lines
18 KiB
JSON
360 lines
18 KiB
JSON
{
|
|
"Definition": [
|
|
{
|
|
"ID": "oval:org.altlinux.errata:def:20151935",
|
|
"Version": "oval:org.altlinux.errata:def:20151935",
|
|
"Class": "patch",
|
|
"Metadata": {
|
|
"Title": "ALT-PU-2015-1935: package `mediawiki` update to version 1.23.11-alt1",
|
|
"AffectedList": [
|
|
{
|
|
"Family": "unix",
|
|
"Platforms": [
|
|
"ALT Linux branch p11"
|
|
],
|
|
"Products": [
|
|
"ALT Container"
|
|
]
|
|
}
|
|
],
|
|
"References": [
|
|
{
|
|
"RefID": "ALT-PU-2015-1935",
|
|
"RefURL": "https://errata.altlinux.org/ALT-PU-2015-1935",
|
|
"Source": "ALTPU"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-2931",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2931",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-2932",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2932",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-2933",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2933",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-2934",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2934",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-2935",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2935",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-2937",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2937",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-2938",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2938",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-2941",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2941",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-2942",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2942",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-6727",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-6727",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-6728",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-6728",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-6729",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-6729",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-6730",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-6730",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-6733",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-6733",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-6734",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-6734",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-8001",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8001",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-8002",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8002",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-8003",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8003",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-8004",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8004",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-8005",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8005",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-8009",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8009",
|
|
"Source": "CVE"
|
|
}
|
|
],
|
|
"Description": "This update upgrades mediawiki to version 1.23.11-alt1. \nSecurity Fix(es):\n\n * CVE-2015-2931: Incomplete blacklist vulnerability in includes/upload/UploadBase.php in MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2 allows remote attackers to inject arbitrary web script or HTML via an application/xml MIME type for a nested SVG with a data: URI.\n\n * CVE-2015-2932: Incomplete blacklist vulnerability in MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2 allows remote attackers to inject arbitrary web script or HTML via an animated href XLink element.\n\n * CVE-2015-2933: Cross-site scripting (XSS) vulnerability in the Html class in MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2 allows remote attackers to inject arbitrary web script or HTML via a LanguageConverter substitution string when using a language variant.\n\n * CVE-2015-2934: MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2 does not properly handle when the Zend interpreter xml_parse function does not expand entities, which allows remote attackers to inject arbitrary web script or HTML via a crafted SVG file.\n\n * CVE-2015-2935: MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2 allows remote attackers to bypass the SVG filtering and obtain sensitive user information via a mixed case @import in a style element in an SVG file, as demonstrated by \"@imporT.\"\n\n * CVE-2015-2937: MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2, when using HHVM or Zend PHP, allows remote attackers to cause a denial of service (\"quadratic blowup\" and memory consumption) via an XML file containing an entity declaration with long replacement text and many references to this entity, a different vulnerability than CVE-2015-2942.\n\n * CVE-2015-2938: Cross-site scripting (XSS) vulnerability in MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2 allows remote attackers to inject arbitrary web script or HTML via a custom JavaScript file, which is not properly handled when previewing the file.\n\n * CVE-2015-2941: Cross-site scripting (XSS) vulnerability in MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2, when using HHVM, allows remote attackers to inject arbitrary web script or HTML via an invalid parameter in a wddx format request to api.php, which is not properly handled in an error message, related to unsafe calls to wddx_serialize_value.\n\n * CVE-2015-2942: MediaWiki before 1.19.24, 1.2x before 1.23.9, and 1.24.x before 1.24.2, when using HHVM, allows remote attackers to cause a denial of service (CPU and memory consumption) via a large number of nested entity references in an (1) SVG file or (2) XMP metadata in a PDF file, aka a \"billion laughs attack,\" a different vulnerability than CVE-2015-2937.\n\n * CVE-2015-6727: The Special:DeletedContributions page in MediaWiki before 1.23.10, 1.24.x before 1.24.3, and 1.25.x before 1.25.2 allows remote attackers to determine if an IP is autoblocked via the \"Change block\" text.\n\n * CVE-2015-6728: The ApiBase::getWatchlistUser function in MediaWiki before 1.23.10, 1.24.x before 1.24.3, and 1.25.x before 1.25.2 does not perform token comparison in constant time, which allows remote attackers to guess the watchlist token and bypass CSRF protection via a timing attack.\n\n * CVE-2015-6729: Cross-site scripting (XSS) vulnerability in thumb.php in MediaWiki before 1.23.10, 1.24.x before 1.24.3, and 1.25.x before 1.25.2 allows remote attackers to inject arbitrary web script or HTML via the rel404 parameter, which is not properly handled in an error page.\n\n * CVE-2015-6730: Cross-site scripting (XSS) vulnerability in thumb.php in MediaWiki before 1.23.10, 1.24.x before 1.24.3, and 1.25.x before 1.25.2 allows remote attackers to inject arbitrary web script or HTML via the f parameter, which is not properly handled in an error page, related to \"ForeignAPI images.\"\n\n * CVE-2015-6733: GeSHi, as used in the SyntaxHighlight_GeSHi extension and MediaWiki before 1.23.10, 1.24.x before 1.24.3, and 1.25.x before 1.25.2, allows remote attackers to cause a denial of service (resource consumption) via unspecified vectors.\n\n * CVE-2015-6734: Cross-site scripting (XSS) vulnerability in contrib/cssgen.php in the GeSHi, as used in the SyntaxHighlight_GeSHi extension and MediaWiki before 1.23.10, 1.24.x before 1.24.3, and 1.25.x before 1.25.2, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.\n\n * CVE-2015-8001: The chunked upload API (ApiUpload) in MediaWiki before 1.23.11, 1.24.x before 1.24.4, and 1.25.x before 1.25.3 does not restrict the uploaded data to the claimed file size, which allows remote authenticated users to cause a denial of service via a chunk that exceeds the file size.\n\n * CVE-2015-8002: The chunked upload API (ApiUpload) in MediaWiki before 1.23.11, 1.24.x before 1.24.4, and 1.25.x before 1.25.3 allows remote authenticated users to cause a denial of service (disk consumption) via a file upload using one byte chunks.\n\n * CVE-2015-8003: MediaWiki before 1.23.11, 1.24.x before 1.24.4, and 1.25.x before 1.25.3 does not throttle file uploads, which allows remote authenticated users to have unspecified impact via multiple file uploads.\n\n * CVE-2015-8004: MediaWiki before 1.23.11, 1.24.x before 1.24.4, and 1.25.x before 1.25.3 does not properly restrict access to revisions, which allows remote authenticated users with the viewsuppressed user right to remove revision suppressions via a crafted revisiondelete action, which returns a valid a change form.\n\n * CVE-2015-8005: MediaWiki before 1.23.11, 1.24.x before 1.24.4, and 1.25.x before 1.25.3 uses the thumbnail ImageMagick command line argument, which allows remote attackers to obtain the installation path by reading the metadata of a PNG thumbnail file.\n\n * CVE-2015-8009: The MWOAuthDataStore::lookup_token function in Extension:OAuth for MediaWiki 1.25.x before 1.25.3, 1.24.x before 1.24.4, and before 1.23.11 does not properly validate the signature when checking the authorization signature, which allows remote registered Consumers to use another Consumer's credentials by leveraging knowledge of the credentials.",
|
|
"Advisory": {
|
|
"From": "errata.altlinux.org",
|
|
"Severity": "Critical",
|
|
"Rights": "Copyright 2024 BaseALT Ltd.",
|
|
"Issued": {
|
|
"Date": "2015-10-29"
|
|
},
|
|
"Updated": {
|
|
"Date": "2015-10-29"
|
|
},
|
|
"BDUs": null,
|
|
"CVEs": [
|
|
{
|
|
"ID": "CVE-2015-2931",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2931",
|
|
"Impact": "Low",
|
|
"Public": "20150413"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-2932",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2932",
|
|
"Impact": "Low",
|
|
"Public": "20150413"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-2933",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2933",
|
|
"Impact": "Low",
|
|
"Public": "20150413"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-2934",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2934",
|
|
"Impact": "Low",
|
|
"Public": "20150413"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-2935",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2935",
|
|
"Impact": "Low",
|
|
"Public": "20150413"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-2937",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
|
|
"CWE": "CWE-399",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2937",
|
|
"Impact": "High",
|
|
"Public": "20150413"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-2938",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2938",
|
|
"Impact": "Low",
|
|
"Public": "20150413"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-2941",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2941",
|
|
"Impact": "Low",
|
|
"Public": "20150413"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-2942",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
|
|
"CWE": "CWE-399",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2942",
|
|
"Impact": "High",
|
|
"Public": "20150413"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-6727",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-6727",
|
|
"Impact": "Low",
|
|
"Public": "20150901"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-6728",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-352",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-6728",
|
|
"Impact": "High",
|
|
"Public": "20150901"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-6729",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-6729",
|
|
"Impact": "Low",
|
|
"Public": "20150901"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-6730",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-6730",
|
|
"Impact": "Low",
|
|
"Public": "20150901"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-6733",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CWE": "CWE-399",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-6733",
|
|
"Impact": "Low",
|
|
"Public": "20150901"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-6734",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-6734",
|
|
"Impact": "Low",
|
|
"Public": "20150901"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-8001",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
|
|
"CWE": "CWE-284",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8001",
|
|
"Impact": "Low",
|
|
"Public": "20151109"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-8002",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
|
"CWE": "CWE-399",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8002",
|
|
"Impact": "Low",
|
|
"Public": "20151109"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-8003",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
|
"CWE": "CWE-399",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8003",
|
|
"Impact": "Low",
|
|
"Public": "20151109"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-8004",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8004",
|
|
"Impact": "Low",
|
|
"Public": "20151109"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-8005",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8005",
|
|
"Impact": "Low",
|
|
"Public": "20151109"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-8009",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-255",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8009",
|
|
"Impact": "Critical",
|
|
"Public": "20170725"
|
|
}
|
|
],
|
|
"AffectedCPEs": {
|
|
"CPEs": [
|
|
"cpe:/o:alt:container:11"
|
|
]
|
|
}
|
|
}
|
|
},
|
|
"Criteria": {
|
|
"Operator": "AND",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:3001",
|
|
"Comment": "ALT Linux must be installed"
|
|
}
|
|
],
|
|
"Criterias": [
|
|
{
|
|
"Operator": "OR",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20151935001",
|
|
"Comment": "mediawiki is earlier than 0:1.23.11-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20151935002",
|
|
"Comment": "mediawiki-apache2 is earlier than 0:1.23.11-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20151935003",
|
|
"Comment": "mediawiki-common is earlier than 0:1.23.11-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20151935004",
|
|
"Comment": "mediawiki-mysql is earlier than 0:1.23.11-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20151935005",
|
|
"Comment": "mediawiki-postgresql is earlier than 0:1.23.11-alt1"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
} |