Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 28 Mar 2014 09:23:46 +0000
From: Florent Daigniere <florent.daigniere@...stmatta.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE request: MediaWiki 1.22.5 login csrf

On Thu, 2014-03-27 at 18:37 -0700, Chris Steipp wrote:
> Hi, we just patched a login CSRF in MediaWiki today. An attacker could
> login a victim as the attacker. Can we get a cve assigned for this?
> 
> Patch:
> https://gerrit.wikimedia.org/r/#/c/121517/1/includes/specials/SpecialChangePassword.php
> 
> Release announcement:
> http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-March/000145.html
> 
> Wikimedia bug:
> https://bugzilla.wikimedia.org/show_bug.cgi?id=62497


That looks like a session-fixation bug to me; not a CSRF... and
therefore it's the wrong control: the session-id should be "renewed",
that's all.

Florent

Download attachment "signature.asc" of type "application/pgp-signature" (474 bytes)

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ