SB2023070323 - Multiple vulnerabilities in MediaWiki MediaWiki Extensions and Skins



SB2023070323 - Multiple vulnerabilities in MediaWiki MediaWiki Extensions and Skins

Published: July 3, 2023 Updated: July 3, 2023

Security Bulletin ID SB2023070323
Severity
Medium
Patch available
YES
Number of vulnerabilities 10
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 40% Low 60%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 10 secuirty vulnerabilities.


1) Cross-site scripting (CVE-ID: CVE-2023-37255)

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data in "get edits". A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


2) Cross-site scripting (CVE-ID: CVE-2023-37251)

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data in the GoogleAnalyticsMetrics parser function. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


3) Information disclosure (CVE-ID: CVE-2023-37252)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to Special:CheckUserLog shows usernames. A remote attacker can gain unauthorized access to sensitive information on the system.


4) Cross-site scripting (CVE-ID: CVE-2023-37256)

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data in the Cargo extension. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


5) Cross-site scripting (CVE-ID: CVE-2023-37254)

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data in Special:CargoQuery. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


6) Information disclosure (CVE-ID: CVE-2023-37253)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to ProofreadPage leaks suppressed user via the API and config variables. A remote attacker can gain unauthorized access to sensitive information on the system.


7) Cross-site scripting (CVE-ID: CVE-2023-37304)

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data in DoubleWiki extension. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


8) Improper access control (CVE-ID: CVE-2023-37303)

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions. A remote attacker can cause attempt to block a user fails after a temporary browser hang and a DBQueryDisconnectedError error message.


9) Input validation error (CVE-ID: CVE-2023-37301)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to Wikidata edit filter does not fire when test tool says it should.


10) Cross-site scripting (CVE-ID: CVE-2023-37302)

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data in SiteLinksView.php in Wikibase. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


Remediation

Install update from vendor's website.

References