Check Point discovers critical vulnerability for Wikipedia.org and other ‘Wiki’ sites
January 2014 by Check Point
Check Point has released findings of a critical vulnerability in the MediaWiki project Web platform, a popular open-source Web platform used to create and maintain ‘wiki’ Web sites. The MediaWiki platform includes Wikipedia.org, the sixth most visited Web site in the world with over 94 million unique visitors per month.
Check Point researchers discovered that this critical vulnerability left MediaWiki (version 1.8 onwards) exposed to remote code execution (RCE), where an attacker can gain complete control of the vulnerable web server.
Check Point immediately alerted the WikiMedia Foundation about the vulnerability, and after verification, the Foundation issued an update and patch to the MediaWiki software. Check Point also delivered updated protections to its worldwide customers in conjunction with the WikiMedia Foundation’s software update.
If the vulnerability had not been uncovered, an attacker would have been able to control the Wikipedia.org Web server, or any other ‘wiki’ site running on MediaWiki, and potentially inject and serve malware-infecting code to users visiting these sites
The WikiMedia Foundation released a software update after learning of the vulnerability from Check Point and encouraged all MediaWiki customers to apply the patch as soon as possible
Since 2006, this is only the third RCE vulnerability found in the MediaWiki platform
Check Point’s Vulnerability Research Group regularly performs assessments of common software to ensure the security of Internet users worldwide. Customers with the Check Point Intrusion Prevention System (IPS) Software Blade automatically received detections for this vulnerability.