The resource loader in MediaWiki 1.17.x before 1.17.3 and 1.18.x before 1.18.2 includes private data such as CSRF tokens in a JavaScript file, which allows remote attackers to obtain sensitive information.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2012/03/24/1 | mailing list |
https://bugzilla.wikimedia.org/show_bug.cgi?id=34907 | exploit |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000110.html | mailing list vendor advisory |
http://secunia.com/advisories/48504 | third party advisory vendor advisory |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2012-March/000109.html | mailing list vendor advisory |
http://www.openwall.com/lists/oss-security/2012/03/22/9 | mailing list |
http://www.securityfocus.com/bid/52689 | vdb entry |