The OAuth extension for MediaWiki improperly negotiates a new client token only over Special:OAuth/initiate, which allows attackers to bypass intended IP address access restrictions by making an API request with an existing token.
References
Link | Resource |
---|---|
https://phabricator.wikimedia.org/T103022 | Issue Tracking Patch Third Party Advisory |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-October/000182.html | Issue Tracking Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1273353 | Issue Tracking Third Party Advisory |
http://www.securitytracker.com/id/1034028 | Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/77379 | Third Party Advisory VDB Entry |
http://www.openwall.com/lists/oss-security/2015/10/29/14 | Issue Tracking Mailing List Third Party Advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171007.html | Issue Tracking Third Party Advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/170979.html | Issue Tracking Third Party Advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/170961.html | Issue Tracking Third Party Advisory |
Information
Published : 2017-12-29 14:29
Updated : 2018-01-11 08:03
NVD link : CVE-2015-8008
Mitre link : CVE-2015-8008
JSON object : View
CWE
CWE-284
Improper Access Control
Products Affected
fedoraproject
- fedora
mediawiki
- mediawiki