Use of hard-coded credentials in MediaWiki - CVE-2012-4381

 

Use of hard-coded credentials in MediaWiki - CVE-2012-4381

Published: February 8, 2020 / Updated: July 17, 2020


Vulnerability identifier: #VU30373
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2012-4381
CWE-ID: CWE-798
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: MediaWiki.org
Affected software:
MediaWiki

Detailed vulnerability description

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

MediaWiki before 1.18.5, and 1.19.x before 1.19.2 saves passwords in the local database, (1) which could make it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack or, (2) when an authentication plugin returns a false in the strict function, could allow remote attackers to use old passwords for non-existing accounts in an external authentication system via unspecified vectors.


How to mitigate CVE-2012-4381

Install update from vendor's website.

Sources