In the OAuth2 Client extension before 0.4 for MediaWiki, a CSRF vulnerability exists due to the OAuth2 state parameter not being checked in the callback function.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://github.com/Schine/MW-OAuth2Client/commit/6a4fe4500ddd72ad4e826d9d63b2d69512bd10d1 | patch |
https://github.com/Schine/MW-OAuth2Client/releases/tag/v0.4 | release notes |
http://www.openwall.com/lists/oss-security/2019/08/19/1 | third party advisory mailing list |
https://seclists.org/bugtraq/2019/Aug/32 | third party advisory mailing list |
http://packetstormsecurity.com/files/154140/MediaWiki-OAuth2-Client-0.3-Cross-Site-Request-Forgery.html | vdb entry third party advisory |
http://seclists.org/fulldisclosure/2019/Aug/25 | third party advisory mailing list |