![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.806632 |
Categoría: | Web application abuses |
Título: | MediaWiki Multiple Vulnerabilities -02 (Nov 2015) - Windows |
Resumen: | MediaWiki is prone to multiple vulnerabilities. |
Descripción: | Summary: MediaWiki is prone to multiple vulnerabilities. Vulnerability Insight: Multiple flaws exist due to: - An error which displays some information about deleted pages in the log API, enhanced RecentChanges, and user watchlists. - An error in CSS whose sanitization did not filter -o-link attributes. - An error leading SVG sanitization to bypass when the XML was considered invalid. - An error in SVG files upload that could lead to include external stylesheets in upload. Vulnerability Impact: Successful exploitation will allow remote attackers to conduct XSS attacks, gain access to sensitive information and have other some unspecified impact. Affected Software/OS: MediaWiki before 1.19.10, 1.2x before 1.21.4, and 1.22.x before 1.22.1 on Windows. Solution: Upgrade to version 1.19.10 or 1.21.4 or 1.22.1 or later. CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2013-6451 http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000138.html Common Vulnerability Exposure (CVE) ID: CVE-2013-6452 Common Vulnerability Exposure (CVE) ID: CVE-2013-6453 Common Vulnerability Exposure (CVE) ID: CVE-2013-6454 Common Vulnerability Exposure (CVE) ID: CVE-2013-6472 |
Copyright | Copyright (C) 2015 Greenbone AG |
Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |