In the OAuth2 Client extension before 0.4 for MediaWiki, a CSRF vulnerability exists due to the OAuth2 state parameter not being checked in the callback function.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/154140/MediaWiki-OAuth2-Client-0.3-Cross-Site-Request-Forgery.html | Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2019/Aug/25 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2019/08/19/1 | Mailing List Third Party Advisory |
https://github.com/Schine/MW-OAuth2Client/commit/6a4fe4500ddd72ad4e826d9d63b2d69512bd10d1 | Patch |
https://github.com/Schine/MW-OAuth2Client/releases/tag/v0.4 | Release Notes |
https://seclists.org/bugtraq/2019/Aug/32 | Mailing List Third Party Advisory |
Configurations
History
No history.
Information
Published : 2019-08-19 04:15
Updated : 2024-02-28 17:08
NVD link : CVE-2019-15150
Mitre link : CVE-2019-15150
CVE.ORG link : CVE-2019-15150
JSON object : View
Products Affected
schine.games
- mw-oauth2client
CWE
CWE-352
Cross-Site Request Forgery (CSRF)