In the OAuth2 Client extension before 0.4 for MediaWiki, a CSRF vulnerability exists due to the OAuth2 state parameter not being checked in the callback function.
References
Configurations
History
21 Nov 2024, 04:28
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/154140/MediaWiki-OAuth2-Client-0.3-Cross-Site-Request-Forgery.html - Third Party Advisory, VDB Entry | |
References | () http://seclists.org/fulldisclosure/2019/Aug/25 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2019/08/19/1 - Mailing List, Third Party Advisory | |
References | () https://github.com/Schine/MW-OAuth2Client/commit/6a4fe4500ddd72ad4e826d9d63b2d69512bd10d1 - Patch | |
References | () https://github.com/Schine/MW-OAuth2Client/releases/tag/v0.4 - Release Notes | |
References | () https://seclists.org/bugtraq/2019/Aug/32 - Mailing List, Third Party Advisory |
08 Mar 2023, 01:21
Type | Values Removed | Values Added |
---|---|---|
References | (FULLDISC) http://seclists.org/fulldisclosure/2019/Aug/25 - Mailing List, Third Party Advisory |
Information
Published : 2019-08-19 04:15
Updated : 2024-11-21 04:28
NVD link : CVE-2019-15150
Mitre link : CVE-2019-15150
CVE.ORG link : CVE-2019-15150
JSON object : View
Products Affected
schine.games
- mw-oauth2client
CWE
CWE-352
Cross-Site Request Forgery (CSRF)