*** This bug is a security vulnerability ***

Public security bug reported:

Binary package hint: mediawiki

== From the security announcement ==
MediaWiki was found to be vulnerable to login CSRF. An attacker who
controls a user account on the target wiki can force the victim to log
in as the attacker, via a script on an external website. If the wiki is
configured to allow user scripts, say with "$wgAllowUserJs = true" in
LocalSettings.php, then the attacker can proceed to mount a
phishing-style attack against the victim to obtain their password.

Even without user scripting, this attack is a potential nuisance, and so
all public wikis should be upgraded if possible.

Our fix includes a breaking change to the API login action. Any clients
using it will need to be updated. We apologise for making such a
disruptive change in a minor release, but we feel that security is
paramount.

For more details see
https://bugzilla.wikimedia.org/show_bug.cgi?id=23076

** Affects: mediawiki (Ubuntu)
     Importance: Undecided
     Assignee: Andreas Wenning (andreas-wenning)
         Status: In Progress

** Visibility changed to: Public

-- 
1.15.3 security release: CSRF login vulnerability
https://bugs.launchpad.net/bugs/557159
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to