First published: Thu Sep 20 2018(Updated: )
As reported: A flaw was found in mediawiki where a unpriviliged login may bypass account lock. Upstream bug: <a href="https://phabricator.wikimedia.org/T194605">https://phabricator.wikimedia.org/T194605</a> References: <a href="https://lists.wikimedia.org/pipermail/mediawiki-announce/2018-September/000223.html">https://lists.wikimedia.org/pipermail/mediawiki-announce/2018-September/000223.html</a>
Credit: security@debian.org security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/mediawiki/core | >=1.27.0<1.27.5>=1.29.0<1.29.3>=1.30.0<1.30.1>=1.31.0<1.31.1 | |
debian/mediawiki | 1:1.31.16-1+deb10u2 1:1.31.16-1+deb10u6 1:1.35.11-1~deb11u1 1:1.35.13-1~deb11u1 1:1.39.4-1~deb12u1 1:1.39.5-1~deb12u1 1:1.39.5-1 | |
redhat/mediawiki | <1.31.1 | 1.31.1 |
redhat/mediawiki | <1.30.1 | 1.30.1 |
redhat/mediawiki | <1.29.3 | 1.29.3 |
redhat/mediawiki | <1.27.5 | 1.27.5 |
composer/mediawiki/core | >=1.31.0<1.31.1 | 1.31.1 |
composer/mediawiki/core | >=1.30.0<1.30.1 | 1.30.1 |
composer/mediawiki/core | >=1.29.0<1.29.3 | 1.29.3 |
composer/mediawiki/core | >=1.27.0<1.27.5 | 1.27.5 |
Wikimedia MediaWiki | >=1.31.0<1.31.1 | |
Wikimedia MediaWiki | =1.27.5 | |
Wikimedia MediaWiki | =1.29.3 | |
Wikimedia MediaWiki | =1.30.1 | |
Debian GNU/Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0505 is considered to be a moderate severity vulnerability as it allows an unprivileged login to bypass account lock mechanisms.
To fix CVE-2018-0505, users should update their MediaWiki installation to versions 1.27.6, 1.29.4, 1.30.2, 1.31.2 or apply the appropriate patches as indicated in the security advisories.
CVE-2018-0505 affects MediaWiki versions from 1.27.0 to 1.31.1 but specifically includes versions up to 1.31.1 without 1.31.2 or later.
Currently, there are no specific workarounds for CVE-2018-0505; updating to the latest version is the recommended action.
CVE-2018-0505 poses a risk where attackers might exploit the vulnerability to gain unauthorized access to user accounts that should be locked out.