FKIE_CVE-2019-16529
Vulnerability from fkie_nvd - Published: 2020-03-19 23:15 - Updated: 2024-11-21 04:30
Severity ?
Summary
An issue was discovered in the CheckUser extension through 1.35.0 for MediaWiki. Oversighted edit summaries are still visible in CheckUser results in violation of MediaWiki's permissions model.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://phabricator.wikimedia.org/T207094 | Permissions Required | |
| cve@mitre.org | https://phabricator.wikimedia.org/rECHU22ddd638ba79903361df88c755232a532cbdbfb3 | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://phabricator.wikimedia.org/T207094 | Permissions Required | |
| af854a3a-2127-422b-91ae-364da2661108 | https://phabricator.wikimedia.org/rECHU22ddd638ba79903361df88c755232a532cbdbfb3 | Patch, Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mediawiki:checkuser:*:*:*:*:*:mediawiki:*:*",
"matchCriteriaId": "2AF1A25E-B80A-411E-8B90-775FB9D662AA",
"versionEndIncluding": "1.35",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in the CheckUser extension through 1.35.0 for MediaWiki. Oversighted edit summaries are still visible in CheckUser results in violation of MediaWiki\u0027s permissions model."
},
{
"lang": "es",
"value": "Se detect\u00f3 un problema en la extensi\u00f3n CheckUser versiones hasta 1.35.0, para MediaWiki. Los res\u00famenes de edici\u00f3n ignorados ??siguen siendo visibles en CheckUser, que resulta en una violaci\u00f3n del modelo de permisos de MediaWiki."
}
],
"id": "CVE-2019-16529",
"lastModified": "2024-11-21T04:30:46.203",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-03-19T23:15:18.490",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Permissions Required"
],
"url": "https://phabricator.wikimedia.org/T207094"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://phabricator.wikimedia.org/rECHU22ddd638ba79903361df88c755232a532cbdbfb3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
],
"url": "https://phabricator.wikimedia.org/T207094"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://phabricator.wikimedia.org/rECHU22ddd638ba79903361df88c755232a532cbdbfb3"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…