In the OAuth2 Client extension before 0.4 for MediaWiki, a CSRF vulnerability exists due to the OAuth2 state parameter not being checked in the callback function.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/Schine/MW-OAuth2Client/commit/6a4fe4500ddd72ad4e826d9d63b2d69512bd10d1 | Patch | 
| https://github.com/Schine/MW-OAuth2Client/releases/tag/v0.4 | Release Notes | 
| http://www.openwall.com/lists/oss-security/2019/08/19/1 | Mailing List Third Party Advisory | 
| https://seclists.org/bugtraq/2019/Aug/32 | Mailing List Third Party Advisory | 
| http://packetstormsecurity.com/files/154140/MediaWiki-OAuth2-Client-0.3-Cross-Site-Request-Forgery.html | Third Party Advisory VDB Entry | 
| http://seclists.org/fulldisclosure/2019/Aug/25 | Mailing List Third Party Advisory | 
Configurations
                    Information
                Published : 2019-08-18 21:15
Updated : 2023-03-07 17:21
NVD link : CVE-2019-15150
Mitre link : CVE-2019-15150
JSON object : View
CWE
                
                    
                        
                        CWE-352
                        
            Cross-Site Request Forgery (CSRF)
Products Affected
                schine.games
- mw-oauth2client
 


