MediaWiki before 1.18.5, and 1.19.x before 1.19.2 saves passwords in the local database, (1) which could make it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack or, (2) when an authentication plugin returns a false in the strict function, could allow remote attackers to use old passwords for non-existing accounts in an external authentication system via unspecified vectors.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2012/08/31/6 | Mailing List Patch Third Party Advisory |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330 | Mailing List Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=853442 | Issue Tracking Patch Third Party Advisory |
http://osvdb.org/show/osvdb/85106 | Broken Link |
http://www.openwall.com/lists/oss-security/2012/08/31/10 | Mailing List Patch Third Party Advisory |
https://phabricator.wikimedia.org/T41184 | Patch Vendor Advisory |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2012-August/000119.html | Patch Release Notes Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2020-02-08 10:15
Updated : 2020-02-12 10:48
NVD link : CVE-2012-4381
Mitre link : CVE-2012-4381
JSON object : View
CWE
CWE-798
Use of Hard-coded Credentials
Products Affected
mediawiki
- mediawiki