vulnerability
MediaWiki: Use of Hard-coded Credentials (CVE-2012-4381)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
9 | (AV:N/AC:M/Au:N/C:C/I:C/A:C) | 2020-02-08 | 2020-02-14 | 2020-02-14 |
Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
2020-02-08
Added
2020-02-14
Modified
2020-02-14
Description
MediaWiki before 1.18.5, and 1.19.x before 1.19.2 saves passwords in the local database, (1) which could make it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack or, (2) when an authentication plugin returns a false in the strict function, could allow remote attackers to use old passwords for non-existing accounts in an external authentication system via unspecified vectors.
Solution(s)
mediawiki-upgrade-1_18_5mediawiki-upgrade-1_19_2
References
- CVE-2012-4381
- https://attackerkb.com/topics/CVE-2012-4381
- URL-http://osvdb.org/show/osvdb/85106
- URL-http://www.openwall.com/lists/oss-security/2012/08/31/10
- URL-http://www.openwall.com/lists/oss-security/2012/08/31/6
- URL-https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330
- URL-https://bugzilla.redhat.com/show_bug.cgi?id=853442
- URL-https://lists.wikimedia.org/pipermail/mediawiki-announce/2012-August/000119.html
- URL-https://phabricator.wikimedia.org/T41184

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.