FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-03-28 15:43:32 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
f36bbd66-aa44-11e5-8f5c-002590263bf5mediawiki -- multiple vulnerabilities

MediaWiki reports:

(T117899) SECURITY: $wgArticlePath can no longer be set to relative paths that do not begin with a slash. This enabled trivial XSS attacks. Configuration values such as "http://my.wiki.com/wiki/$1" are fine, as are "/wiki/$1". A value such as "$1" or "wiki/$1" is not and will now throw an error.

(T119309) SECURITY: Use hash_compare() for edit token comparison.

(T118032) SECURITY: Don't allow cURL to interpret POST parameters starting with '@' as file uploads.

(T115522) SECURITY: Passwords generated by User::randomPassword() can no longer be shorter than $wgMinimalPasswordLength.

(T97897) SECURITY: Improve IP parsing and trimming. Previous behavior could result in improper blocks being issued.

(T109724) SECURITY: Special:MyPage, Special:MyTalk, Special:MyContributions and related pages no longer use HTTP redirects and are now redirected by MediaWiki.


Discovery 2015-12-18
Entry 2015-12-24
mediawiki123
< 1.23.12

mediawiki124
< 1.24.5

mediawiki125
< 1.25.4

mediawiki126
< 1.26.1

CVE-2015-8622
CVE-2015-8623
CVE-2015-8624
CVE-2015-8625
CVE-2015-8626
CVE-2015-8627
CVE-2015-8628
https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-December/000186.html
https://phabricator.wikimedia.org/T117899
https://phabricator.wikimedia.org/T119309
https://phabricator.wikimedia.org/T118032
https://phabricator.wikimedia.org/T115522
https://phabricator.wikimedia.org/T97897
https://phabricator.wikimedia.org/T109724
http://www.openwall.com/lists/oss-security/2015/12/23/7