-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2753-1 security@debian.org http://www.debian.org/security/ Thijs Kinkhorst September 13, 2013 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : mediawiki Vulnerability : information leak Problem type : remote Debian-specific: no CVE ID : CVE-2013-4302 It was discovered that in Mediawiki, a wiki engine, several API modules allowed anti-CSRF tokens to be accessed via JSONP. These tokens protect against cross site request forgeries and are confidential. For the oldstable distribution (squeeze), this problem has been fixed in version 1.15.5-2squeeze6. For the stable distribution (wheezy), this problem has been fixed in version 1.19.5-1+deb7u1. For the testing distribution (jessie) and unstable distribution (sid), this problem has been fixed in version 1.19.8+dfsg-1. We recommend that you upgrade your mediawiki packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iQEcBAEBAgAGBQJSMsSzAAoJEFb2GnlAHawEswAH/0ucxY3KlJ8bMNqCLllZxDxC EPNgflHIPVZlI//b8k5N52c3G0ql/rF5N1ewpmHNXCRwaxwXZF7UgJJ1ph2sjhj/ fAK00C97tlO/84Ya/qxzsjonDRXqpkJ3Y3VMWyI7J6kUavS4qf+8xvCVQYYoH1/h 5cFiKyTWYOLFZ1CcuoG/6m7LE3L/oaI8NXswAz8fKB+dISeK9kD62KSqzb1t5UYg 4GjzeakInryWsYF2TebGmDlyK/Vy5xttIKkCKSi/0qQIXJr5cOckIew2FrroRJSD N3CHj/3ahGkKi1n0stzuux/8e9QJcGK94kO3ekJdreQRHD9CxenootAeFMs/tus= =ZDhD -----END PGP SIGNATURE-----