The User::matchEditToken function in includes/User.php in MediaWiki before 1.23.12 and 1.24.x before 1.24.5 does not perform token comparison in constant time before returning, which allows remote attackers to guess the edit token and bypass CSRF protection via a timing attack, a different vulnerability than CVE-2015-8624.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-December/000186.html | mailing list release notes patch vendor advisory |
http://www.openwall.com/lists/oss-security/2015/12/23/7 | mailing list third party advisory patch |
https://phabricator.wikimedia.org/T119309 | third party advisory patch |
http://www.openwall.com/lists/oss-security/2015/12/21/8 | mailing list third party advisory patch |
https://gerrit.wikimedia.org/r/#/c/156336/5/includes/User.php | issue tracking third party advisory |