MediaWiki & amp; gt; = 1.5 CSS verification information leakage Vulnerability

Source: Internet
Author: User
Tags mediawiki

Affected Versions:
MediaWiki >=1.5 vulnerability description:

MediaWiki is a famous wiki program running in the PHP + MySQL environment.

The CSS verification function of MediaWiki does not prohibit wiki editors from linking to images of other websites on the wiki page, this allows editors to obtain IP addresses and other sensitive information about wiki users through graphic links added to malicious websites. <* Reference
Security suggestions:
Vendor patch:

Debian has released a Security Bulletin (DSA-2022-1) and patches for this:
DSA-2022-1: New mediawiki packages fix several vulnerabilities

Patch download:

Source archives:

Size/MD5 checksum: 1549 cdd8466f627db0d230059bea9dc3bffa
Size/MD5 checksum: 7188806 117a1360fda-883a51f0ebca32906ea0
Size/MD5 checksum: 61443 fe024a07a1555b8aa813183b98de41da

Architecture independent packages:

Size/MD5 checksum: 7231304 ec3604e69ac212e506df83c93e8fec14

Alpha architecture (DEC Alpha)

Size/MD5 checksum: 49794 92ea80eb2c975d2fa01e48385467eacd

Amd64 architecture (AMD x86_64 (AMD64 ))

Size/MD5 checksum: 156990 4a889dd13d45f38b3594a2dd47e9b59e

Arm architecture (ARM)

Size/MD5 checksum: 49258 93033e2a83ec4436b07648a20f53ff60

Armel architecture (arm eabi)

Size/MD5 checksum: 49226 2814b384dc142da907fa80ac1af1d32a

Hppa architecture (hp pa risc)

Size/MD5 checksum: 49774 29bfc18a66159684703604a192bc654a

I386 architecture (Intel ia32)

Size/MD5 checksum: 138776 then b418d062e4b954b98?ac36240d7

Ia64 architecture (Intel ia64)

Size/MD5 checksum: 49762 4eabbe35adb52e9b3c27ac3cebac3126

Mipsel architecture (MIPS (Little Endian ))

Size/MD5 checksum: 49772 243c3c339a86ea1bbca7fa58192fd364

Powerpc architecture (PowerPC)

Size/MD5 checksum: 162814 82c66b11b70c174cc3b08e36cb4430be

S390 architecture (ibm s/390)

Size/MD5 checksum: 49246 7ffe72a079284372ae24c49e55b6170b

Iscsi architecture (Sun iSCSI/UltraSPARC)

Size/MD5 checksum: 158134 d96cefd805d0ced4b6477c244ebf2e06

Patch installation method:

1. Manually install the patch package:

First, use the following command to download the patch software:
# Wget url (the url is the patch download link)

Then, use the following command to install the patch:
# Dpkg-I file. deb (file is the patch name)

2. Use apt-get to automatically install the patch package:

First, use the following command to update the internal database:
# Apt-get update

Then, run the following command to install the update software package:
# Apt-get upgrade

The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:


Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.