First published: Thu Mar 23 2017(Updated: )
The User::matchEditToken function in includes/User.php in MediaWiki before 1.23.12 and 1.24.x before 1.24.5 does not perform token comparison in constant time before returning, which allows remote attackers to guess the edit token and bypass CSRF protection via a timing attack, a different vulnerability than CVE-2015-8624.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wikimedia MediaWiki | <=1.23.11 | |
Wikimedia MediaWiki | =1.24.0 | |
Wikimedia MediaWiki | =1.24.1 | |
Wikimedia MediaWiki | =1.24.2 | |
Wikimedia MediaWiki | =1.24.3 | |
Wikimedia MediaWiki | =1.24.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8623 has a severity rating that indicates it allows remote attackers to bypass CSRF protection.
To fix CVE-2015-8623, upgrade MediaWiki to versions 1.23.12 or later, or 1.24.5 or later.
MediaWiki versions before 1.23.12 and 1.24.x before 1.24.5 are affected by CVE-2015-8623.
CVE-2015-8623 allows attackers to guess the edit token using a timing attack.
The User::matchEditToken function in includes/User.php is the vulnerable component in CVE-2015-8623.