Mageia 2023-0241: mediawiki security update
Summary
guzzlehttp/psr7 is a PSR-7 HTTP message library implementation in PHP.
Affected versions are subject to improper header parsing. An attacker
could sneak in a newline (\n) into both the header names and values.
While the specification states that \r\n\r\n is used to terminate the
header list, many servers in the wild will also accept \n\n
(CVE-2023-29197).
Manualthumb bypasses badFile lookup (CVE-2023-36674).
XSS in BlockLogFormatter due to unsafe message use (CVE-2023-36675).
References
- https://bugs.mageia.org/show_bug.cgi?id=32083
- https://lists.wikimedia.org/hyperkitty/list/mediawiki-announce@lists.wikimedia.org/thread/HVT3U3XYY35PSCIQPHMY4VQNF3Q6MHUO/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29197
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36674
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36675
Resolution
MGASA-2023-0241 - Updated mediawiki packages fix security vulnerability
SRPMS
- 8/core/mediawiki-1.35.11-1.mga8