FKIE_CVE-2024-47816
Vulnerability from fkie_nvd - Published: 2024-10-09 19:15 - Updated: 2024-10-10 12:51
Severity ?
Summary
ImportDump is a mediawiki extension designed to automate user import requests. A user's local actor ID is stored in the database to tell who made what requests. Therefore, if a user on another wiki happens to have the same actor ID as someone on the central wiki, the user on the other wiki can act as if they're the original wiki requester. This can be abused to create new comments, edit the request, and view the request if it's marked private. This issue has been addressed in commit `5c91dfc` and all users are advised to update. Users unable to update may disable the special page outside of their global wiki. See `miraheze/mw-config@e566499` for details on that.
References
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ImportDump is a mediawiki extension designed to automate user import requests. A user\u0027s local actor ID is stored in the database to tell who made what requests. Therefore, if a user on another wiki happens to have the same actor ID as someone on the central wiki, the user on the other wiki can act as if they\u0027re the original wiki requester. This can be abused to create new comments, edit the request, and view the request if it\u0027s marked private. This issue has been addressed in commit `5c91dfc` and all users are advised to update. Users unable to update may disable the special page outside of their global wiki. See `miraheze/mw-config@e566499` for details on that."
},
{
"lang": "es",
"value": "ImportDump es una extensi\u00f3n de MediaWiki dise\u00f1ada para automatizar las solicitudes de importaci\u00f3n de los usuarios. El ID de actor local de un usuario se almacena en la base de datos para indicar qui\u00e9n realiz\u00f3 qu\u00e9 solicitudes. Por lo tanto, si un usuario de otra wiki tiene el mismo ID de actor que alguien de la wiki central, el usuario de la otra wiki puede actuar como si fuera el solicitante original de la wiki. Esto se puede aprovechar para crear nuevos comentarios, editar la solicitud y ver la solicitud si est\u00e1 marcada como privada. Este problema se ha solucionado en el commit `5c91dfc` y se recomienda a todos los usuarios que actualicen. Los usuarios que no puedan actualizar pueden deshabilitar la p\u00e1gina especial fuera de su wiki global. Consulte `miraheze/mw-config@e566499` para obtener m\u00e1s detalles al respecto."
}
],
"id": "CVE-2024-47816",
"lastModified": "2024-10-10T12:51:56.987",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L",
"version": "3.1"
},
"exploitabilityScore": 1.6,
"impactScore": 4.7,
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
},
"published": "2024-10-09T19:15:14.227",
"references": [
{
"source": "security-advisories@github.com",
"url": "https://github.com/miraheze/ImportDump/commit/5c91dfce78320e717516ee65ef5a05f01979ee6c"
},
{
"source": "security-advisories@github.com",
"url": "https://github.com/miraheze/ImportDump/security/advisories/GHSA-jjmq-mg36-6387"
},
{
"source": "security-advisories@github.com",
"url": "https://github.com/miraheze/mw-config/commit/e5664995fbb8644f9a80b450b4326194f20f9ddc"
},
{
"source": "security-advisories@github.com",
"url": "https://issue-tracker.miraheze.org/T12701"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-282"
}
],
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…