SB2023070323 - Multiple vulnerabilities in MediaWiki MediaWiki Extensions and Skins
Published: July 3, 2023 Updated: July 3, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 10 secuirty vulnerabilities.
1) Cross-site scripting (CVE-ID: CVE-2023-37255)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in "get edits". A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
2) Cross-site scripting (CVE-ID: CVE-2023-37251)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in the GoogleAnalyticsMetrics parser function. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
3) Information disclosure (CVE-ID: CVE-2023-37252)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to Special:CheckUserLog shows usernames. A remote attacker can gain unauthorized access to sensitive information on the system.
4) Cross-site scripting (CVE-ID: CVE-2023-37256)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in the Cargo extension. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
5) Cross-site scripting (CVE-ID: CVE-2023-37254)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in Special:CargoQuery. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
6) Information disclosure (CVE-ID: CVE-2023-37253)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to ProofreadPage leaks suppressed user via the API and config variables. A remote attacker can gain unauthorized access to sensitive information on the system.
7) Cross-site scripting (CVE-ID: CVE-2023-37304)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in DoubleWiki extension. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
8) Improper access control (CVE-ID: CVE-2023-37303)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions. A remote attacker can cause attempt to block a user fails after a temporary browser hang and a DBQueryDisconnectedError error message.
9) Input validation error (CVE-ID: CVE-2023-37301)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to Wikidata edit filter does not fire when test tool says it should.
10) Cross-site scripting (CVE-ID: CVE-2023-37302)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in SiteLinksView.php in Wikibase. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
Remediation
Install update from vendor's website.
References
- https://phabricator.wikimedia.org/T333569
- https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CheckUser/+/905706/
- https://lists.wikimedia.org/hyperkitty/list/mediawiki-announce@lists.wikimedia.org/thread/4GNSSE2VECVOPWE2NUKWD4C5IOSSF73R/
- https://phabricator.wikimedia.org/T333980
- https://gerrit.wikimedia.org/r/c/mediawiki/extensions/GoogleAnalyticsMetrics/+/905661/
- https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CheckUser/+/933686/
- https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CheckUser/+/932822/
- https://phabricator.wikimedia.org/T331311
- https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Cargo/+/894679
- https://phabricator.wikimedia.org/T331065
- https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Cargo/+/894666
- https://gerrit.wikimedia.org/r/q/Ibe5f8e25dea155bbd811a65833394c0d4b906a34
- https://gerrit.wikimedia.org/r/c/mediawiki/extensions/DoubleWiki/+/932825
- https://phabricator.wikimedia.org/T323651
- https://gerrit.wikimedia.org/r/c/mediawiki/extensions/DoubleWiki/+/933666/
- https://gerrit.wikimedia.org/r/c/mediawiki/extensions/DoubleWiki/+/933667/
- https://gerrit.wikimedia.org/r/q/I10a9273c542576b3f7bb38de68dcd2aa41cfb1b0
- https://phabricator.wikimedia.org/T338276
- https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CheckUser/+/932823/
- https://phabricator.wikimedia.org/T250720
- https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Wikibase/+/933663
- https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Wikibase/+/933649
- https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Wikibase/+/933650
- https://phabricator.wikimedia.org/T339111