CVE-2015-8623

Source
https://nvd.nist.gov/vuln/detail/CVE-2015-8623
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2015-8623.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2015-8623
Related
Published
2017-03-23T20:59:00Z
Modified
2024-12-29T17:00:05Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

The User::matchEditToken function in includes/User.php in MediaWiki before 1.23.12 and 1.24.x before 1.24.5 does not perform token comparison in constant time before returning, which allows remote attackers to guess the edit token and bypass CSRF protection via a timing attack, a different vulnerability than CVE-2015-8624.

References

Affected packages

Debian:11 / mediawiki

Package

Name
mediawiki
Purl
pkg:deb/debian/mediawiki?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:1.25.5-1

Ecosystem specific

{
    "urgency": "low"
}

Debian:12 / mediawiki

Package

Name
mediawiki
Purl
pkg:deb/debian/mediawiki?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:1.25.5-1

Ecosystem specific

{
    "urgency": "low"
}