ApiParse in MediaWiki before 1.23.15, 1.26.x before 1.26.4, and 1.27.x before 1.27.1 allows remote attackers to bypass intended per-title read restrictions via a parse action to api.php.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1369613 | Issue Tracking |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2016-August/000195.html | Mailing List Patch Vendor Advisory |
https://phabricator.wikimedia.org/T115333 | Patch Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1369613 | Issue Tracking |
https://lists.wikimedia.org/pipermail/mediawiki-announce/2016-August/000195.html | Mailing List Patch Vendor Advisory |
https://phabricator.wikimedia.org/T115333 | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:55
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1369613 - Issue Tracking | |
References | () https://lists.wikimedia.org/pipermail/mediawiki-announce/2016-August/000195.html - Mailing List, Patch, Vendor Advisory | |
References | () https://phabricator.wikimedia.org/T115333 - Patch, Third Party Advisory |
Information
Published : 2017-04-20 17:59
Updated : 2024-11-21 02:55
NVD link : CVE-2016-6331
Mitre link : CVE-2016-6331
CVE.ORG link : CVE-2016-6331
JSON object : View
Products Affected
mediawiki
- mediawiki
CWE
CWE-284
Improper Access Control