First published: Sun Sep 27 2020(Updated: )
An issue was discovered in the OATHAuth extension in MediaWiki before 1.31.10 and 1.32.x through 1.34.x before 1.34.4. For Wikis using OATHAuth on a farm/cluster (such as via CentralAuth), rate limiting of OATH tokens is only done on a single site level. Thus, multiple requests can be made across many wikis/sites concurrently.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/mediawiki/core | >=1.31.0<1.31.9>=1.34.0<1.34.3 | |
debian/mediawiki | 1:1.31.16-1+deb10u2 1:1.31.16-1+deb10u6 1:1.35.11-1~deb11u1 1:1.35.13-1~deb11u1 1:1.39.4-1~deb12u1 1:1.39.5-1~deb12u1 1:1.39.5-1 | |
composer/mediawiki/core | >=1.32.0<1.34.3 | 1.34.3 |
composer/mediawiki/core | >=1.31.0<1.31.9 | 1.31.9 |
MediaWiki | <1.31.10 | |
MediaWiki | >=1.32.0<1.34.4 | |
Red Hat Fedora | =33 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-25827 has been assigned a moderate severity rating due to its potential for OATH token abuse.
To fix CVE-2020-25827, upgrade to MediaWiki version 1.31.10, 1.34.4, or any later version.
CVE-2020-25827 affects MediaWiki versions from 1.31.0 to 1.31.9 and 1.34.0 to 1.34.3.
CVE-2020-25827 specifically affects MediaWiki instances using the OATHAuth extension in a farm or cluster setup.
The risk associated with CVE-2020-25827 includes susceptibility to rate limiting bypass which could lead to unauthorized access.