First published: Mon Jan 25 2021(Updated: )
The MediaWiki "Report" extension has a Cross-Site Request Forgery (CSRF) vulnerability. Before fixed version, there was no protection against CSRF checks on Special:Report, so requests to report a revision could be forged. The problem has been fixed in commit f828dc6 by making use of MediaWiki edit tokens.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Report project Report MediaWiki | <2021-01-21 | |
Oracle Communications Cloud Native Core Network Slice Selection Function | =1.2.1 | |
Oracle Communications Pricing Design Center | =12.0.0.4.0 | |
Oracle Communications Pricing Design Center | =12.0.0.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21275 is a Cross-Site Request Forgery (CSRF) vulnerability in the MediaWiki Report extension.
CVE-2021-21275 has a severity value of 4.3, which is considered medium.
CVE-2021-21275 allows forged requests to be made to report a revision through the Special:Report feature in MediaWiki before the fix.
Yes, CVE-2021-21275 has been fixed in commit f828dc6 of the Report extension in MediaWiki.
You can find more information about CVE-2021-21275 in the provided references: [Link 1](https://github.com/Kenny2github/Report/commit/f828dc6f73cdfaea5639edbf8ac7b326eeefb117), [Link 2](https://github.com/Kenny2github/Report/security/advisories/GHSA-9f3w-c334-jm2h), [Link 3](https://www.oracle.com//security-alerts/cpujul2021.html).