First published: Thu Jun 06 2019(Updated: )
API responses for unpatrolled or (not) autopatrolled recent changes require privileges but may be cached publicly
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/mediawiki/core | >=1.27.0<1.27.6>=1.30.0<1.30.2>=1.31.0<1.31.2>=1.32.0<1.32.2 | |
debian/mediawiki | 1:1.31.16-1+deb10u2 1:1.31.16-1+deb10u6 1:1.35.11-1~deb11u1 1:1.35.13-1~deb11u1 1:1.39.4-1~deb12u1 1:1.39.5-1~deb12u1 1:1.39.5-1 | |
composer/mediawiki/core | >=1.32.0<1.32.2 | 1.32.2 |
composer/mediawiki/core | >=1.31.0<1.31.2 | 1.31.2 |
composer/mediawiki/core | >=1.30.0<1.30.2 | 1.30.2 |
composer/mediawiki/core | >=1.27.0<1.27.6 | 1.27.6 |
Wikimedia MediaWiki | >=1.23.0<1.27.6 | |
Wikimedia MediaWiki | >=1.30.0<1.30.2 | |
Wikimedia MediaWiki | >=1.31.0<1.31.2 | |
Wikimedia MediaWiki | >=1.32.0<1.32.2 | |
Debian GNU/Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-12474 is classified as a medium severity vulnerability due to its potential for information leak.
To fix CVE-2019-12474, upgrade MediaWiki to version 1.32.2 or later.
MediaWiki versions 1.23.0 through 1.32.1 are affected by CVE-2019-12474.
CVE-2019-12474 is an information leak vulnerability that exposes privileged API responses.
There is no official workaround for CVE-2019-12474; upgrading to a fixed version is recommended.