summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorJason Unovitch <junovitch@FreeBSD.org>2015-10-23 03:43:36 +0000
committerJason Unovitch <junovitch@FreeBSD.org>2015-10-23 03:43:36 +0000
commitfc111cf1ceb849a8caa80f449e88fc0f6a4584bf (patch)
tree17c57359da716742006e712eec9cefd72c3406c8
parent963bdd826b5a3aea058601b6d094cfa6add4cc5a (diff)
downloadfreebsd-ports-fc111cf1ceb849a8caa80f449e88fc0f6a4584bf.zip
Document Mediawiki security vulnerabilities for 1.25.3, 1.24.4, and 1.23.11
Security: https://vuxml.FreeBSD.org/freebsd/b973a763-7936-11e5-a2a1-002590263bf5.html
-rw-r--r--security/vuxml/vuln.xml53
1 files changed, 53 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 34b72ea1adae..1096762bad7c 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -58,6 +58,59 @@ Notes:
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="b973a763-7936-11e5-a2a1-002590263bf5">
+ <topic>mediawiki -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>mediawiki123</name>
+ <range><lt>1.23.11</lt></range>
+ </package>
+ <package>
+ <name>mediawiki124</name>
+ <range><lt>1.24.4</lt></range>
+ </package>
+ <package>
+ <name>mediawiki125</name>
+ <range><lt>1.25.3</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>MediaWiki reports:</p>
+ <blockquote cite="https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-October/000181.html">
+ <p>Wikipedia user RobinHood70 reported two issues in the chunked
+ upload API. The API failed to correctly stop adding new chunks to
+ the upload when the reported size was exceeded (T91203), allowing
+ a malicious users to upload add an infinite number of chunks for a
+ single file upload. Additionally, a malicious user could upload
+ chunks of 1 byte for very large files, potentially creating a very
+ large number of files on the server's filesystem (T91205).</p>
+ <p>Internal review discovered that it is not possible to throttle file
+ uploads.</p>
+ <p>Internal review discovered a missing authorization check when
+ removing suppression from a revision. This allowed users with the
+ 'viewsuppressed' user right but not the appropriate
+ 'suppressrevision' user right to unsuppress revisions.</p>
+ <p>Richard Stanway from teamliquid.net reported that thumbnails of PNG
+ files generated with ImageMagick contained the local file path in
+ the image metadata.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-October/000181.html</url>
+ <url>https://phabricator.wikimedia.org/T91203</url>
+ <url>https://phabricator.wikimedia.org/T91205</url>
+ <url>https://phabricator.wikimedia.org/T91850</url>
+ <url>https://phabricator.wikimedia.org/T95589</url>
+ <url>https://phabricator.wikimedia.org/T108616</url>
+ </references>
+ <dates>
+ <discovery>2015-10-16</discovery>
+ <entry>2015-10-23</entry>
+ </dates>
+ </vuln>
+
<vuln vid="c4a18a12-77fc-11e5-a687-206a8a720317">
<topic>ntp -- 13 low- and medium-severity vulnerabilities</topic>
<affects>