The JSONP endpoint in includes/api/ApiFormatJson.php in MediaWiki before 1.19.18, 1.20.x through 1.22.x before 1.22.9, and 1.23.x before 1.23.2 accepts certain long callback values and does not restrict the initial bytes of a JSONP response, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks, and obtain sensitive information, via a crafted OBJECT element with SWF content consistent with a restricted character set.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-July/000157.html | mailing list |
http://www.debian.org/security/2014/dsa-3011 | vendor advisory |
http://www.mandriva.com/security/advisories?name=MDVSA-2014:153 | vendor advisory |
http://secunia.com/advisories/59738 | third party advisory |
https://bugzilla.wikimedia.org/show_bug.cgi?id=68187 | patch vendor advisory exploit |
http://openwall.com/lists/oss-security/2014/08/14/5 | mailing list |
http://advisories.mageia.org/MGASA-2014-0309.html |