CVE-2012-4381

MediaWiki before 1.18.5, and 1.19.x before 1.19.2 saves passwords in the local database, (1) which could make it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack or, (2) when an authentication plugin returns a false in the strict function, could allow remote attackers to use old passwords for non-existing accounts in an external authentication system via unspecified vectors.
References
Link Resource
http://www.openwall.com/lists/oss-security/2012/08/31/6 Mailing List Patch Third Party Advisory
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330 Mailing List Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=853442 Issue Tracking Patch Third Party Advisory
http://osvdb.org/show/osvdb/85106 Broken Link
http://www.openwall.com/lists/oss-security/2012/08/31/10 Mailing List Patch Third Party Advisory
https://phabricator.wikimedia.org/T41184 Patch Vendor Advisory
https://lists.wikimedia.org/pipermail/mediawiki-announce/2012-August/000119.html Patch Release Notes Vendor Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*
cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*

Information

Published : 2020-02-08 10:15

Updated : 2020-02-12 10:48


NVD link : CVE-2012-4381

Mitre link : CVE-2012-4381


JSON object : View

CWE
CWE-798

Use of Hard-coded Credentials

Advertisement

dedicated server usa

Products Affected

mediawiki

  • mediawiki