The JSONP endpoint in includes/api/ApiFormatJson.php in MediaWiki before 1.19.18, 1.20.x through 1.22.x before 1.22.9, and 1.23.x before 1.23.2 accepts certain long callback values and does not restrict the initial bytes of a JSONP response, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks, and obtain sensitive information, via a crafted OBJECT element with SWF content consistent with a restricted character set.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:11
Type | Values Removed | Values Added |
---|---|---|
References | () http://advisories.mageia.org/MGASA-2014-0309.html - | |
References | () http://openwall.com/lists/oss-security/2014/08/14/5 - | |
References | () http://secunia.com/advisories/59738 - | |
References | () http://www.debian.org/security/2014/dsa-3011 - | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2014:153 - | |
References | () https://bugzilla.wikimedia.org/show_bug.cgi?id=68187 - Exploit, Patch, Vendor Advisory | |
References | () https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-July/000157.html - |
Information
Published : 2014-08-22 17:55
Updated : 2024-11-21 02:11
NVD link : CVE-2014-5241
Mitre link : CVE-2014-5241
CVE.ORG link : CVE-2014-5241
JSON object : View
Products Affected
mediawiki
- mediawiki
CWE
CWE-352
Cross-Site Request Forgery (CSRF)