Vulnerabilities / Threats
1/29/2014
03:01 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Check Point Researchers Find Critical Vulnerability On Wikipedia, Other ‘Wiki’ Sites

Vulnerability left MediaWiki, which includes Wikipedia.org, exposed to remote code execution

January 29, 2013 – SAN CARLOS, CA -- Check Point® Software Technologies Ltd. (Nasdaq: CHKP), the worldwide leader in securing the Internet, today released its findings of a critical vulnerability in the MediaWiki project Web platform, a popular open-source Web platform used to create and maintain 'wiki' Web sites. The MediaWiki platform includes Wikipedia.org, the sixth most visited Web site in the world[1] with over 94 million unique visitors per month.[2]

Check Point researchers discovered that this critical vulnerability left MediaWiki (version 1.8 onwards) exposed to remote code execution (RCE), where an attacker can gain complete control of the vulnerable web server. Check Point immediately alerted the WikiMedia Foundation about the vulnerability, and after verification, the Foundation issued an update and patch to the MediaWiki software. Check Point also delivered updated protections to its worldwide customers in conjunction with the WikiMedia Foundation's software update.

Key Findings:

If the vulnerability had not been uncovered, an attacker would have been able to control the Wikipedia.org Web server, or any other 'wiki' site running on MediaWiki, and potentially inject and serve malware-infecting code to users visiting these sites

The WikiMedia Foundation released a software update after learning of the vulnerability from Check Point and encouraged all MediaWiki customers to apply the patch as soon as possible

Since 2006, this is only the third RCE vulnerability found in the MediaWiki platform[3]

Check Point's Vulnerability Research Group regularly performs assessments of common software to ensure the security of Internet users worldwide. Customers with the Check Point Intrusion Prevention System (IPS) Software Blade automatically received detections for this vulnerability.

"It only takes a single vulnerability on a widely adopted platform for a hacker to infiltrate and wreak widespread damage. The Check Point Vulnerability Research Group focuses on finding these security exposures and deploying the necessary real-time protections to secure the Internet. We're pleased that the MediaWiki platform is now protected against attacks on this vulnerability, which would have posed great security risk for millions of daily 'wiki' site users," said Dorit Dor, vice president of products at Check Point Software Technologies.

For additional details, visit: http://www.checkpoint.com/threatcloud-central/index.html

1 According to Alexa, www.alexa.com/topsites

2 According to Compete.com, http://siteanalytics.compete.com/wikipedia.org

3 According to CVE Details, http://www.cvedetails.com/product/4125/Mediawiki-Mediawiki.html

Follow Check Point via

Twitter: www.twitter.com/checkpointsw

Facebook: https://www.facebook.com/checkpointsoftware

YouTube: http://www.youtube.com/user/CPGlobal

About Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd. (www.checkpoint.com), the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to develop new innovations based on the Software Blade Architecture, providing customers with flexible and simple solutions that can be fully customized to meet the exact security needs of any organization. Check Point is the only vendor to go beyond technology and define security as a business process. Check Point 3D Security uniquely combines policy, people and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs. Customers include tens of thousands of organizations of all sizes, including all Fortune and Global 100 companies. Check Point's award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-4262
Published: 2014-07-28
svnwcsub.py in Subversion 1.8.0 before 1.8.3, when using the --pidfile option and running in foreground mode, allows local users to gain privileges via a symlink attack on the pid file. NOTE: this issue was SPLIT due to different affected versions (ADT3). The irkerbridge.py issue is covered by CVE-...

CVE-2013-4840
Published: 2014-07-28
Unspecified vulnerability in HP and H3C VPN Firewall Module products SECPATH1000FE before 5.20.R3177 and SECBLADEFW before 5.20.R3177 allows remote attackers to cause a denial of service via unknown vectors.

CVE-2013-7393
Published: 2014-07-28
The daemonize.py module in Subversion 1.8.0 before 1.8.2 allows local users to gain privileges via a symlink attack on the pid file created for (1) svnwcsub.py or (2) irkerbridge.py when the --pidfile option is used. NOTE: this issue was SPLIT from CVE-2013-4262 based on different affected versions...

CVE-2014-2974
Published: 2014-07-28
Cross-site request forgery (CSRF) vulnerability in php/user_account.php in Silver Peak VX through 6.2.4 allows remote attackers to hijack the authentication of administrators for requests that create administrative accounts.

CVE-2014-2975
Published: 2014-07-28
Cross-site scripting (XSS) vulnerability in php/user_account.php in Silver Peak VX before 6.2.4 allows remote attackers to inject arbitrary web script or HTML via the user_id parameter.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.