[FREEBSD:3C5A4FE0-9EBB-11E9-9169-FCAA147E860E] mediawiki -- multiple vulnerabilities

Severity Critical
Affected Packages 2
CVEs 10

Mediawiki reports:

  Security fixes:
    T197279, CVE-2019-12468: Directly POSTing to Special:ChangeEmail would allow
    for bypassing reauthentication, allowing for potential account takeover.
    T204729, CVE-2019-12473: Passing invalid titles to the API could cause a DoS
    by querying the entire `watchlist` table.
    T207603, CVE-2019-12471: Loading user JavaScript from a non-existent account
    allows anyone to create the account, and XSS the users' loading that script.
    T208881: blacklist CSS var().
    T199540, CVE-2019-12472: It is possible to bypass the limits on IP range
    blocks (`$wgBlockCIDRLimit`) by using the API.
    T212118, CVE-2019-12474: Privileged API responses that include whether a
    recent change has been patrolled may be cached publicly.
    T209794, CVE-2019-12467: A spammer can use Special:ChangeEmail to send out
    spam with no rate limiting or ability to block them.
    T25227, CVE-2019-12466: An account can be logged out without using a token(CRRF)
    T222036, CVE-2019-12469: Exposed suppressed username or log in Special:EditTags.
    T222038, CVE-2019-12470: Exposed suppressed log in RevisionDelete page.
    T221739, CVE-2019-11358: Fix potential XSS in jQuery.
Package Affected Version
pkg:freebsd/mediawiki132 < 1.32.3
pkg:freebsd/mediawiki131 < 1.31.3
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:freebsd/mediawiki132 mediawiki132 < 1.32.3
Affected pkg:freebsd/mediawiki131 mediawiki131 < 1.31.3
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...