Use of hard-coded credentials in MediaWiki - CVE-2012-4381
Published: February 8, 2020 / Updated: July 17, 2020
MediaWiki
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
MediaWiki before 1.18.5, and 1.19.x before 1.19.2 saves passwords in the local database, (1) which could make it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack or, (2) when an authentication plugin returns a false in the strict function, could allow remote attackers to use old passwords for non-existing accounts in an external authentication system via unspecified vectors.
How to mitigate CVE-2012-4381
Sources
- http://osvdb.org/show/osvdb/85106
- http://www.openwall.com/lists/oss-security/2012/08/31/10
- http://www.openwall.com/lists/oss-security/2012/08/31/6
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330
- https://bugzilla.redhat.com/show_bug.cgi?id=853442
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2012-August/000119.html
- https://phabricator.wikimedia.org/T41184