CVE-2015-8624Cross-Site Request Forgery in Mediawiki

Severity
8.8HIGHNVD
EPSS
0.1%
top 69.75%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 23
Latest updateMay 17

Description

The User::matchEditToken function in includes/User.php in MediaWiki before 1.23.12, 1.24.x before 1.24.5, 1.25.x before 1.25.4, and 1.26.x before 1.26.1 does not perform token comparison in constant time before determining if a debugging message should be logged, which allows remote attackers to guess the edit token and bypass CSRF protection via a timing attack, a different vulnerability than CVE-2015-8623.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages3 packages

debiandebian/mediawiki< mediawiki 1:1.25.5-1 (bookworm)
Debianmediawiki/mediawiki< 1:1.25.5-1+3
NVDmediawiki/mediawiki1.23.11+10

Patches

🔴Vulnerability Details

4
GHSA
GHSA-3h2m-jjrw-87hw: The User::matchEditToken function in includes/User2022-05-17
GHSA
GHSA-8h72-c6mj-ffxx: The User::matchEditToken function in includes/User2022-05-17
OSV
CVE-2015-8624: The User::matchEditToken function in includes/User2017-03-23
OSV
CVE-2015-8623: The User::matchEditToken function in includes/User2017-03-23

📋Vendor Advisories

2
Debian
CVE-2015-8624: mediawiki - The User::matchEditToken function in includes/User.php in MediaWiki before 1.23....2015
Debian
CVE-2015-8623: mediawiki - The User::matchEditToken function in includes/User.php in MediaWiki before 1.23....2015

💬Community

1
Bugzilla
CVE-2015-8622 CVE-2015-8623 CVE-2015-8624 CVE-2015-8625 CVE-2015-8626 CVE-2015-8627 CVE-2015-8628 mediawiki: multiple flaws fixed in 1.26.1, 1.25.4, 1.24.5, and 1.23.122015-12-23
CVE-2015-8624 — Cross-Site Request Forgery in Mediawiki | cvebase