First published: Sun Aug 01 2010(Updated: )
MediaWiki upstream has released: [1] <a href="http://lists.wikimedia.org/pipermail/mediawiki-announce/2010-July/000092.html">http://lists.wikimedia.org/pipermail/mediawiki-announce/2010-July/000092.html</a> v1.16.0 and v.1.15.5 versions of MediaWiki, addressing the following XSS flaw (from [1]): A cross-site scripting (XSS) vulnerability was discovered in profileinfo.php. The vulnerability is only exposed when the script is explicitly enabled in LocalSettings.php, with $wgEnableProfileInfo = true.
Affected Software | Affected Version | How to fix |
---|---|---|
MediaWiki | =1.16.0=1.15.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-620225 is classified as a moderate security risk due to the XSS vulnerability present in affected versions.
To fix REDHAT-BUG-620225, upgrade to MediaWiki version 1.16.0 or 1.15.5 as recommended by the upstream release.
MediaWiki versions 1.15.5 and 1.16.0 are affected by REDHAT-BUG-620225, containing the XSS vulnerability.
REDHAT-BUG-620225 discusses an XSS (Cross-Site Scripting) vulnerability that can be exploited in MediaWiki.
There is no official workaround for REDHAT-BUG-620225; the recommended action is to update to the patched versions.