First published: Mon Oct 11 2021(Updated: )
The ReplaceText extension through 1.41 for MediaWiki has Incorrect Access Control. When a user is blocked after submitting a replace job, the job is still run, even if it may be run at a later time (due to the job queue backlog)
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/mediawiki | 1:1.31.16-1+deb10u2 1:1.31.16-1+deb10u6 1:1.35.11-1~deb11u1 1:1.35.13-1~deb11u1 1:1.39.4-1~deb12u1 1:1.39.5-1~deb12u1 1:1.39.5-1 | |
MediaWiki MediaWiki | <1.31.16 | |
MediaWiki MediaWiki | >=1.35.0<1.35.4 | |
MediaWiki MediaWiki | >=1.36.0<1.36.2 | |
<1.31.16 | ||
>=1.35.0<1.35.4 | ||
>=1.36.0<1.36.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-41801 is a vulnerability in the ReplaceText extension through 1.41 for MediaWiki that has Incorrect Access Control.
The severity of CVE-2021-41801 is high, with a CVSS score of 8.8.
CVE-2021-41801 allows a blocked user to still run a replace job in MediaWiki, even if they are blocked.
The affected software for CVE-2021-41801 includes MediaWiki versions 1.31.16, 1.35.0 to 1.35.4, and 1.36.0 to 1.36.2.
To fix CVE-2021-41801 in MediaWiki, update to versions 1.31.16-1+deb10u2, 1.31.16-1+deb10u6, 1.35.11-1~deb11u1, 1.35.13-1~deb11u1, 1.39.4-1~deb12u1, 1.39.5-1~deb12u1, or 1.39.5-1.