vulnerability
MediaWiki: Use of Hard-coded Credentials (CVE-2012-4381)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 9 | (AV:N/AC:M/Au:N/C:C/I:C/A:C) | Feb 8, 2020 | Feb 14, 2020 | Feb 14, 2020 |
Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
Feb 8, 2020
Added
Feb 14, 2020
Modified
Feb 14, 2020
Description
MediaWiki before 1.18.5, and 1.19.x before 1.19.2 saves passwords in the local database, (1) which could make it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack or, (2) when an authentication plugin returns a false in the strict function, could allow remote attackers to use old passwords for non-existing accounts in an external authentication system via unspecified vectors.
Solutions
mediawiki-upgrade-1_18_5mediawiki-upgrade-1_19_2
References
- CVE-2012-4381
- https://attackerkb.com/topics/CVE-2012-4381
- URL-http://osvdb.org/show/osvdb/85106
- URL-http://www.openwall.com/lists/oss-security/2012/08/31/10
- URL-http://www.openwall.com/lists/oss-security/2012/08/31/6
- URL-https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330
- URL-https://bugzilla.redhat.com/show_bug.cgi?id=853442
- URL-https://lists.wikimedia.org/pipermail/mediawiki-announce/2012-August/000119.html
- URL-https://phabricator.wikimedia.org/T41184
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.