MediaWiki before 1.17.1 does not check for read permission before handling action=ajax requests, which allows remote attackers to obtain sensitive information by (1) leveraging the SpecialUpload::ajaxGetExistsWarning function, or by (2) leveraging an extension, as demonstrated by the CategoryTree, ExtTab, and InlineEditor extensions.
References
Link | Resource |
---|---|
http://openwall.com/lists/oss-security/2011/11/29/6 | Mailing List Third Party Advisory |
https://bugzilla.wikimedia.org/show_bug.cgi?id=32616 | Issue Tracking Patch Vendor Advisory |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-November/000104.html | Patch Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=758171 | Issue Tracking Third Party Advisory |
http://openwall.com/lists/oss-security/2011/11/29/12 | Mailing List Third Party Advisory |
http://www.debian.org/security/2011/dsa-2366 | Third Party Advisory |
Information
Published : 2012-01-08 03:55
Updated : 2021-04-21 07:54
NVD link : CVE-2011-4361
Mitre link : CVE-2011-4361
JSON object : View
CWE
CWE-276
Incorrect Default Permissions
Products Affected
debian
- debian_linux
mediawiki
- mediawiki