First published: Fri Apr 13 2018(Updated: )
Parameters injection in the SyntaxHighlight extension of Mediawiki before 1.23.16, 1.27.3 and 1.28.2 might result in multiple vulnerabilities.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/mediawiki | 1:1.35.13-1+deb11u2 1:1.39.7-1~deb12u1 1:1.39.8-1 | |
MediaWiki | <=1.23.15 | |
MediaWiki | =1.27.0 | |
MediaWiki | =1.27.1 | |
MediaWiki | =1.27.2 | |
MediaWiki | =1.28.0 | |
MediaWiki | =1.28.1 | |
Debian Linux | =7.0 | |
Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-0372 is considered to have multiple potential vulnerabilities due to parameter injection in the SyntaxHighlight extension of MediaWiki.
To fix CVE-2017-0372, upgrade MediaWiki to versions 1.23.16, 1.27.3, or 1.28.2 and later.
CVE-2017-0372 affects MediaWiki versions prior to 1.23.16, 1.27.3, and 1.28.2.
Yes, CVE-2017-0372 has the potential for remote exploitation due to parameter injection vulnerabilities.
Exploitation of CVE-2017-0372 may lead to unauthorized actions which could compromise the integrity of the MediaWiki instance.