Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Wiki site vulnerability discovered

Check Point : 31 January, 2014  (Technical Article)
Remote code execution discovery on Wiki platform patched on basis of recommendation by Check Point to prevent malware code injection
Wiki site vulnerability discovered

Check Point has released findings of a critical vulnerability in the MediaWiki project Web platform, a popular open-source Web platform used to create and maintain ‘wiki’ Web sites. The MediaWiki platform includes Wikipedia.org, the sixth most visited Web site in the world with over 94 million unique visitors per month.

Check Point researchers discovered that this critical vulnerability left MediaWiki (version 1.8 onwards) exposed to remote code execution (RCE), where an attacker can gain complete control of the vulnerable web server.

Check Point immediately alerted the WikiMedia Foundation about the vulnerability, and after verification, the Foundation issued an update and patch to the MediaWiki software. Check Point also delivered updated protections to its worldwide customers in conjunction with the WikiMedia Foundation’s software update.

Key Findings:

* If the vulnerability had not been uncovered, an attacker would have been able to control the Wikipedia.org Web server, or any other ‘wiki’ site running on MediaWiki, and potentially inject and serve malware-infecting code to users visiting these sites

* The WikiMedia Foundation released a software update after learning of the vulnerability from Check Point and encouraged all MediaWiki customers to apply the patch as soon as possible

* Since 2006, this is only the third RCE vulnerability found in the MediaWiki platform

Check Point’s Vulnerability Research Group regularly performs assessments of common software to ensure the security of Internet users worldwide. Customers with the Check Point Intrusion Prevention System (IPS) Software Blade automatically received detections for this vulnerability.

“It only takes a single vulnerability on a widely adopted platform for a hacker to infiltrate and wreak widespread damage. The Check Point Vulnerability Research Group focuses on finding these security exposures and deploying the necessary real-time protections to secure the Internet. We’re pleased that the MediaWiki platform is now protected against attacks on this vulnerability, which would have posed great security risk for millions of daily ‘wiki’ site users,” said Dorit Dor, vice president of products at Check Point Software Technologies.

Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo