First published: Tue Sep 01 2015(Updated: )
The ApiBase::getWatchlistUser function in MediaWiki before 1.23.10, 1.24.x before 1.24.3, and 1.25.x before 1.25.2 does not perform token comparison in constant time, which allows remote attackers to guess the watchlist token and bypass CSRF protection via a timing attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MediaWiki MediaWiki | <=1.23.9 | |
MediaWiki MediaWiki | =1.24.0 | |
MediaWiki MediaWiki | =1.24.1 | |
MediaWiki MediaWiki | =1.24.2 | |
MediaWiki MediaWiki | =1.25.0 | |
MediaWiki MediaWiki | =1.25.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.