The User::matchEditToken function in includes/User.php in MediaWiki before 1.23.12 and 1.24.x before 1.24.5 does not perform token comparison in constant time before returning, which allows remote attackers to guess the edit token and bypass CSRF protection via a timing attack, a different vulnerability than CVE-2015-8624.
References
Link Resource
http://www.openwall.com/lists/oss-security/2015/12/21/8 Mailing List Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2015/12/23/7 Mailing List Patch Third Party Advisory
https://gerrit.wikimedia.org/r/#/c/156336/5/includes/User.php Issue Tracking Third Party Advisory
https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-December/000186.html Patch Release Notes Vendor Advisory
https://phabricator.wikimedia.org/T119309 Patch Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2017-03-23T20:00:00

Updated: 2017-03-23T19:57:01

Reserved: 2015-12-23T00:00:00


Link: CVE-2015-8623

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2017-03-23T20:59:00.483

Modified: 2017-03-27T13:47:22.580


Link: CVE-2015-8623

JSON object: View

cve-icon Redhat Information

No data.

CWE