Arch Linux Security Advisory ASA-201504-11
=========================================
Severity: Medium
Date    : 2015-04-10
CVE-ID  : CVE-2015-2931 CVE-2015-2932 CVE-2015-2933 CVE-2015-2934
          CVE-2015-2935 CVE-2015-2936 CVE-2015-2937 CVE-2015-2938
          CVE-2015-2939 CVE-2015-2940 CVE-2015-2941 CVE-2015-2942
Package : mediawiki
Type    : multiple issues
Remote  : Yes
Link    : https://wiki.archlinux.org/title/CVE

Summary
======
The package mediawiki before version 1.24.2-1 is vulnerable to multiple
issues including but not limited to cross-side scripting, external
resource loading, cross-side request forgery and denial of service.

Resolution
=========
Upgrade to 1.24.2-1.

# pacman -Syu "mediawiki>=1.24.2-1"

The problems have been fixed upstream in version 1.24.2.

Workaround
=========
None.

Description
==========
- CVE-2015-2931 (cross-side scripting)

It was discovered that MIME types were not properly restricted, allowing
a way to circumvent the SVG MIME blacklist for embedded resources. This
allowed an attacker to embed JavaScript in a SVG file.

- CVE-2015-2932 (cross-side scripting)

The SVG filter to prevent injecting JavaScript using animate elements
was incorrect. The list of dangerous parts of HTML5 is supposed to
include all uses of 'animate attributename="xlink:href"' in SVG documents.

- CVE-2015-2933 (cross-side scripting)

A persistent XSS vulnerability was discovered due to the way attributes
were expanded in MediaWiki's HTML class, in combination with
LanguageConverter substitutions.

- CVE-2015-2934 (cross-side scripting)

It was discovered that MediaWiki's SVG filtering could be bypassed with
entity encoding under the Zend interpreter. This could be used to inject
JavaScript.

- CVE-2015-2935 (external resource loading)

A way was discovered to bypass the style filtering for SVG files to load
external resource. This could violate the anonymity of users viewing the
SVG. This issue exists because of an incomplete fix for CVE-2014-7199.

- CVE-2015-2936 (denial of service)

It was discovered that MediaWiki versions using PBKDF2 for password
hashing (the default since 1.24) are vulnerable to DoS attacks using
extremely long passwords.

- CVE-2015-2937 (denial of service)

It was discovered that MediaWiki is vulnerable to "Quadratic Blowup"
denial of service attacks.

- CVE-2015-2938 (cross-side scripting)

It was discovered that the MediaWiki feature allowing a user to preview
another user's custom JavaScript could be abused for privilege
escalation. This feature has been removed.

- CVE-2015-2939 (cross-side scripting)

It was discovered that function names were not sanitized in Lua error
backtraces, which could lead to XSS.

- CVE-2015-2940 (cross-side request forgery)

It was discovered that the CheckUser extension did not prevent CSRF
attacks on the form allowing checkusers to look up sensitive information
about other users. Since the use of CheckUser is logged, the CSRF could
be abused to defame a trusted user or flood the logs with noise.

- CVE-2015-2941 (cross-side scripting)

It was discovered that XSS is possible in the way api errors were
reflected under HHVM versions before 3.6.1. MediaWiki now detects and
mitigates this issue on older versions of HHVM.

- CVE-2015-2942 (denial of service)

It was discovered that MediaWiki's SVG and XMP parsing running under
HHVM was susceptible to "Billion Laughs" DoS attacks.

Impact
=====
A remote attacker is able to perform cross-side scripting, external
resource loading, cross-side request forgery and denial of service via
various vectors.

References
=========
https://lists.wikimedia.org/hyperkitty/list/mediawiki-announce@lists.wikimedia.org/message/OTOGQLR6TBG7FPQ2OKWLZ4LKLLR5UAKN/
https://seclists.org/oss-sec/2015/q2/61
https://access.redhat.com/security/cve/CVE-2015-2931
https://access.redhat.com/security/cve/CVE-2015-2932
https://access.redhat.com/security/cve/CVE-2015-2933
https://access.redhat.com/security/cve/CVE-2015-2934
https://access.redhat.com/security/cve/CVE-2015-2935
https://access.redhat.com/security/cve/CVE-2015-2936
https://access.redhat.com/security/cve/CVE-2015-2937
https://access.redhat.com/security/cve/CVE-2015-2938
https://access.redhat.com/security/cve/CVE-2015-2939
https://access.redhat.com/security/cve/CVE-2015-2940
https://access.redhat.com/security/cve/CVE-2015-2941
https://access.redhat.com/security/cve/CVE-2015-2942

ArchLinux: 201504-11: mediawiki: multiple issues

April 10, 2015

Summary

- CVE-2015-2931 (cross-side scripting) It was discovered that MIME types were not properly restricted, allowing a way to circumvent the SVG MIME blacklist for embedded resources. This allowed an attacker to embed JavaScript in a SVG file.
- CVE-2015-2932 (cross-side scripting)
The SVG filter to prevent injecting JavaScript using animate elements was incorrect. The list of dangerous parts of HTML5 is supposed to include all uses of 'animate attributename="xlink:href"' in SVG documents.
- CVE-2015-2933 (cross-side scripting)
A persistent XSS vulnerability was discovered due to the way attributes were expanded in MediaWiki's HTML class, in combination with LanguageConverter substitutions.
- CVE-2015-2934 (cross-side scripting)
It was discovered that MediaWiki's SVG filtering could be bypassed with entity encoding under the Zend interpreter. This could be used to inject JavaScript.
- CVE-2015-2935 (external resource loading)
A way was discovered to bypass the style filtering for SVG files to load external resource. This could violate the anonymity of users viewing the SVG. This issue exists because of an incomplete fix for CVE-2014-7199.
- CVE-2015-2936 (denial of service)
It was discovered that MediaWiki versions using PBKDF2 for password hashing (the default since 1.24) are vulnerable to DoS attacks using extremely long passwords.
- CVE-2015-2937 (denial of service)
It was discovered that MediaWiki is vulnerable to "Quadratic Blowup" denial of service attacks.
- CVE-2015-2938 (cross-side scripting)
It was discovered that the MediaWiki feature allowing a user to preview another user's custom JavaScript could be abused for privilege escalation. This feature has been removed.
- CVE-2015-2939 (cross-side scripting)
It was discovered that function names were not sanitized in Lua error backtraces, which could lead to XSS.
- CVE-2015-2940 (cross-side request forgery)
It was discovered that the CheckUser extension did not prevent CSRF attacks on the form allowing checkusers to look up sensitive information about other users. Since the use of CheckUser is logged, the CSRF could be abused to defame a trusted user or flood the logs with noise.
- CVE-2015-2941 (cross-side scripting)
It was discovered that XSS is possible in the way api errors were reflected under HHVM versions before 3.6.1. MediaWiki now detects and mitigates this issue on older versions of HHVM.
- CVE-2015-2942 (denial of service)
It was discovered that MediaWiki's SVG and XMP parsing running under HHVM was susceptible to "Billion Laughs" DoS attacks.

Resolution

Upgrade to 1.24.2-1. # pacman -Syu "mediawiki>=1.24.2-1"
The problems have been fixed upstream in version 1.24.2.

References

https://lists.wikimedia.org/hyperkitty/list/mediawiki-announce@lists.wikimedia.org/message/OTOGQLR6TBG7FPQ2OKWLZ4LKLLR5UAKN/ https://seclists.org/oss-sec/2015/q2/61 https://access.redhat.com/security/cve/CVE-2015-2931 https://access.redhat.com/security/cve/CVE-2015-2932 https://access.redhat.com/security/cve/CVE-2015-2933 https://access.redhat.com/security/cve/CVE-2015-2934 https://access.redhat.com/security/cve/CVE-2015-2935 https://access.redhat.com/security/cve/CVE-2015-2936 https://access.redhat.com/security/cve/CVE-2015-2937 https://access.redhat.com/security/cve/CVE-2015-2938 https://access.redhat.com/security/cve/CVE-2015-2939 https://access.redhat.com/security/cve/CVE-2015-2940 https://access.redhat.com/security/cve/CVE-2015-2941 https://access.redhat.com/security/cve/CVE-2015-2942

Severity
CVE-2015-2935 CVE-2015-2936 CVE-2015-2937 CVE-2015-2938
CVE-2015-2939 CVE-2015-2940 CVE-2015-2941 CVE-2015-2942
Package : mediawiki
Type : multiple issues
Remote : Yes
Link : https://wiki.archlinux.org/title/CVE

Workaround

None.

Related News