Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j8wf-wp2j-cmg7

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The ApiBase::getWatchlistUser function in MediaWiki before 1.23.10, 1.24.x before 1.24.3, and 1.25.x before 1.25.2 does not perform token comparison in constant time, which allows remote attackers to guess the watchlist token and bypass CSRF protection via a timing attack.

The ApiBase::getWatchlistUser function in MediaWiki before 1.23.10, 1.24.x before 1.24.3, and 1.25.x before 1.25.2 does not perform token comparison in constant time, which allows remote attackers to guess the watchlist token and bypass CSRF protection via a timing attack.

EPSS

Процентиль: 37%
0.00158
Низкий

Дефекты

CWE-352

Связанные уязвимости

ubuntu
больше 10 лет назад

The ApiBase::getWatchlistUser function in MediaWiki before 1.23.10, 1.24.x before 1.24.3, and 1.25.x before 1.25.2 does not perform token comparison in constant time, which allows remote attackers to guess the watchlist token and bypass CSRF protection via a timing attack.

nvd
больше 10 лет назад

The ApiBase::getWatchlistUser function in MediaWiki before 1.23.10, 1.24.x before 1.24.3, and 1.25.x before 1.25.2 does not perform token comparison in constant time, which allows remote attackers to guess the watchlist token and bypass CSRF protection via a timing attack.

debian
больше 10 лет назад

The ApiBase::getWatchlistUser function in MediaWiki before 1.23.10, 1. ...

EPSS

Процентиль: 37%
0.00158
Низкий

Дефекты

CWE-352