CVE-2015-6728

The ApiBase::getWatchlistUser function in MediaWiki before 1.23.10, 1.24.x before 1.24.3, and 1.25.x before 1.25.2 does not perform token comparison in constant time, which allows remote attackers to guess the watchlist token and bypass CSRF protection via a timing attack.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*
cpe:2.3:a:mediawiki:mediawiki:1.24.0:*:*:*:*:*:*:*
cpe:2.3:a:mediawiki:mediawiki:1.24.1:*:*:*:*:*:*:*
cpe:2.3:a:mediawiki:mediawiki:1.24.2:*:*:*:*:*:*:*
cpe:2.3:a:mediawiki:mediawiki:1.25.0:*:*:*:*:*:*:*
cpe:2.3:a:mediawiki:mediawiki:1.25.1:*:*:*:*:*:*:*

History

21 Nov 2024, 02:35

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165193.html - () http://lists.fedoraproject.org/pipermail/package-announce/2015-August/165193.html -
References () http://www.openwall.com/lists/oss-security/2015/08/12/6 - () http://www.openwall.com/lists/oss-security/2015/08/12/6 -
References () http://www.openwall.com/lists/oss-security/2015/08/27/6 - () http://www.openwall.com/lists/oss-security/2015/08/27/6 -
References () http://www.securityfocus.com/bid/76334 - () http://www.securityfocus.com/bid/76334 -
References () https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-August/000179.html - Vendor Advisory () https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-August/000179.html - Vendor Advisory
References () https://security.gentoo.org/glsa/201510-05 - () https://security.gentoo.org/glsa/201510-05 -

Information

Published : 2015-09-01 14:59

Updated : 2024-11-21 02:35


NVD link : CVE-2015-6728

Mitre link : CVE-2015-6728

CVE.ORG link : CVE-2015-6728


JSON object : View

Products Affected

mediawiki

  • mediawiki
CWE
CWE-352

Cross-Site Request Forgery (CSRF)