CVE-2015-8623

The User::matchEditToken function in includes/User.php in MediaWiki before 1.23.12 and 1.24.x before 1.24.5 does not perform token comparison in constant time before returning, which allows remote attackers to guess the edit token and bypass CSRF protection via a timing attack, a different vulnerability than CVE-2015-8624.
References
Link Resource
https://phabricator.wikimedia.org/T119309 Patch Third Party Advisory
https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-December/000186.html Patch Release Notes Vendor Advisory
https://gerrit.wikimedia.org/r/#/c/156336/5/includes/User.php Issue Tracking Third Party Advisory
http://www.openwall.com/lists/oss-security/2015/12/23/7 Mailing List Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2015/12/21/8 Mailing List Patch Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*
cpe:2.3:a:mediawiki:mediawiki:1.24.0:*:*:*:*:*:*:*
cpe:2.3:a:mediawiki:mediawiki:1.24.1:*:*:*:*:*:*:*
cpe:2.3:a:mediawiki:mediawiki:1.24.2:*:*:*:*:*:*:*
cpe:2.3:a:mediawiki:mediawiki:1.24.4:*:*:*:*:*:*:*
cpe:2.3:a:mediawiki:mediawiki:1.24.3:*:*:*:*:*:*:*

Information

Published : 2017-03-23 13:59

Updated : 2017-03-27 06:47


NVD link : CVE-2015-8623

Mitre link : CVE-2015-8623


JSON object : View

CWE
CWE-352

Cross-Site Request Forgery (CSRF)

Advertisement

dedicated server usa

Products Affected

mediawiki

  • mediawiki