First published: Thu Mar 23 2017(Updated: )
MediaWiki before 1.23.12, 1.24.x before 1.24.5, 1.25.x before 1.25.4, and 1.26.x before 1.26.1 do not properly sanitize parameters when calling the cURL library, which allows remote attackers to read arbitrary files via an @ (at sign) character in unspecified POST array parameters.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wikimedia MediaWiki | <=1.23.11 | |
Wikimedia MediaWiki | =1.24.0 | |
Wikimedia MediaWiki | =1.24.1 | |
Wikimedia MediaWiki | =1.24.2 | |
Wikimedia MediaWiki | =1.24.3 | |
Wikimedia MediaWiki | =1.24.4 | |
Wikimedia MediaWiki | =1.25.0 | |
Wikimedia MediaWiki | =1.25.1 | |
Wikimedia MediaWiki | =1.25.2 | |
Wikimedia MediaWiki | =1.25.3 | |
Wikimedia MediaWiki | =1.26.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8625 is classified as a medium severity vulnerability due to the risk of unauthorized file access.
To fix CVE-2015-8625, upgrade MediaWiki to version 1.23.12, 1.24.5, 1.25.4, or 1.26.1 or later.
MediaWiki versions before 1.23.12, 1.24.x before 1.24.5, 1.25.x before 1.25.4, and 1.26.x before 1.26.1 are vulnerable.
CVE-2015-8625 allows remote attackers to read arbitrary files on the server through improper parameter sanitization.
Yes, user data may be at risk if an attacker exploits CVE-2015-8625 to access sensitive files.