The User::matchEditToken function in includes/User.php in MediaWiki before 1.23.12, 1.24.x before 1.24.5, 1.25.x before 1.25.4, and 1.26.x before 1.26.1 does not perform token comparison in constant time before determining if a debugging message should be logged, which allows remote attackers to guess the edit token and bypass CSRF protection via a timing attack, a different vulnerability than CVE-2015-8623.
References
Link Resource
http://www.openwall.com/lists/oss-security/2015/12/21/8 Mailing List Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2015/12/23/7 Mailing List Patch Third Party Advisory
https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-December/000186.html Patch Release Notes Vendor Advisory
https://phabricator.wikimedia.org/T119309 Patch Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2017-03-23T20:00:00

Updated: 2017-03-23T19:57:01

Reserved: 2015-12-23T00:00:00


Link: CVE-2015-8624

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2017-03-23T20:59:00.530

Modified: 2017-03-27T13:47:58.223


Link: CVE-2015-8624

JSON object: View

cve-icon Redhat Information

No data.

CWE