First published: Thu Sep 20 2018(Updated: )
$wgRateLimits (rate limit / ping limiter) entry for 'user' overrides that for 'newbie'
Credit: security@debian.org security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/mediawiki/core | >=1.27.0<1.27.5>=1.29.0<1.29.3>=1.30.0<1.30.1>=1.31.0<1.31.1 | |
debian/mediawiki | 1:1.31.16-1+deb10u2 1:1.31.16-1+deb10u6 1:1.35.11-1~deb11u1 1:1.35.13-1~deb11u1 1:1.39.4-1~deb12u1 1:1.39.5-1~deb12u1 1:1.39.5-1 | |
redhat/mediawiki | <1.31.1 | 1.31.1 |
redhat/mediawiki | <1.30.1 | 1.30.1 |
redhat/mediawiki | <1.29.3 | 1.29.3 |
redhat/mediawiki | <1.27.5 | 1.27.5 |
composer/mediawiki/core | >=1.31.0<1.31.1 | 1.31.1 |
composer/mediawiki/core | >=1.30.0<1.30.1 | 1.30.1 |
composer/mediawiki/core | >=1.29.0<1.29.3 | 1.29.3 |
composer/mediawiki/core | >=1.27.0<1.27.5 | 1.27.5 |
Wikimedia MediaWiki | >=1.31.0<1.31.1 | |
Wikimedia MediaWiki | =1.27.5 | |
Wikimedia MediaWiki | =1.29.3 | |
Wikimedia MediaWiki | =1.30.1 | |
Debian GNU/Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0503 is rated as a medium severity vulnerability due to its potential to allow newly registered users to bypass intended rate limits.
To fix CVE-2018-0503, you should upgrade to a patched version of MediaWiki, specifically versions 1.27.5, 1.29.3, 1.30.1, or 1.31.1.
CVE-2018-0503 affects MediaWiki versions from 1.27.0 to less than 1.31.1, including specific Debian and Red Hat packages.
Yes, CVE-2018-0503 can be exploited remotely by an attacker creating a newly registered account to bypass rate limits.
There are no specific workarounds for CVE-2018-0503; upgrading to a secure version is the recommended solution.