First published: Thu Apr 20 2017(Updated: )
MediaWiki before 1.23.15, 1.26.x before 1.26.4, and 1.27.x before 1.27.1, when $wgBlockDisablesLogin is true, might allow remote attackers to obtain sensitive information by leveraging failure to terminate sessions when a user account is blocked.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wikimedia MediaWiki | <=1.23.14 | |
Wikimedia MediaWiki | =1.26.0 | |
Wikimedia MediaWiki | =1.26.1 | |
Wikimedia MediaWiki | =1.26.2 | |
Wikimedia MediaWiki | =1.26.3 | |
Wikimedia MediaWiki | =1.26.4 | |
Wikimedia MediaWiki | =1.27.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6332 is considered a medium-severity vulnerability that may expose sensitive information.
To fix CVE-2016-6332, upgrade MediaWiki to version 1.23.15, 1.26.4, or 1.27.1 or later.
CVE-2016-6332 is caused by the failure to terminate user sessions when an account is blocked, particularly when the $wgBlockDisablesLogin setting is enabled.
CVE-2016-6332 affects MediaWiki versions before 1.23.15, 1.26.x before 1.26.4, and 1.27.x before 1.27.1.
Yes, CVE-2016-6332 can potentially lead to unauthorized access to sensitive information, as it allows for session persistence after account blocking.