First published: Thu Mar 23 2017(Updated: )
The User::matchEditToken function in includes/User.php in MediaWiki before 1.23.12, 1.24.x before 1.24.5, 1.25.x before 1.25.4, and 1.26.x before 1.26.1 does not perform token comparison in constant time before determining if a debugging message should be logged, which allows remote attackers to guess the edit token and bypass CSRF protection via a timing attack, a different vulnerability than CVE-2015-8623.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MediaWiki MediaWiki | <=1.23.11 | |
MediaWiki MediaWiki | =1.24.0 | |
MediaWiki MediaWiki | =1.24.1 | |
MediaWiki MediaWiki | =1.24.2 | |
MediaWiki MediaWiki | =1.24.3 | |
MediaWiki MediaWiki | =1.24.4 | |
MediaWiki MediaWiki | =1.25.0 | |
MediaWiki MediaWiki | =1.25.1 | |
MediaWiki MediaWiki | =1.25.2 | |
MediaWiki MediaWiki | =1.25.3 | |
MediaWiki MediaWiki | =1.26.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.