First published: Wed Aug 24 2016(Updated: )
ApiParse in MediaWiki before 1.23.15, 1.26.x before 1.26.4, and 1.27.x before 1.27.1 allows remote attackers to bypass intended per-title read restrictions via a parse action to api.php.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/mediawiki | <1.27.1 | 1.27.1 |
redhat/mediawiki | <1.26.4 | 1.26.4 |
redhat/mediawiki | <1.23.15 | 1.23.15 |
MediaWiki | <=1.23.14 | |
MediaWiki | =1.26.0 | |
MediaWiki | =1.26.1 | |
MediaWiki | =1.26.2 | |
MediaWiki | =1.26.3 | |
MediaWiki | =1.26.4 | |
MediaWiki | =1.27.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6331 is classified as a vulnerability that allows remote attackers to bypass read restrictions, which can lead to unauthorized access to content.
To fix CVE-2016-6331, update MediaWiki to version 1.27.1, 1.26.4, or 1.23.15.
CVE-2016-6331 affects MediaWiki versions prior to 1.27.1, 1.26.4, and 1.23.15.
Yes, CVE-2016-6331 allows unauthenticated remote attackers to exploit the vulnerability and access restricted content.
CVE-2016-6331 is a bypass vulnerability that specifically affects the API access and content restrictions in MediaWiki.