Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 28 Mar 2014 07:19:13 -0700
From: Chris Steipp <csteipp@...imedia.org>
To: oss-security@...ts.openwall.com
Subject: Re: CVE request: MediaWiki 1.22.5 login csrf

The session-id is renewed when the user successfully logs in with a
password reset. The issue that we patched was that the anti-CSRF token for
non-authenticated users on the password change form was guessable, and
would remain that way even if we regenerated the user's session-id each
time they accessed the password rest / login form.




On Fri, Mar 28, 2014 at 2:23 AM, Florent Daigniere <
florent.daigniere@...stmatta.com> wrote:

> On Thu, 2014-03-27 at 18:37 -0700, Chris Steipp wrote:
> > Hi, we just patched a login CSRF in MediaWiki today. An attacker could
> > login a victim as the attacker. Can we get a cve assigned for this?
> >
> > Patch:
> >
> https://gerrit.wikimedia.org/r/#/c/121517/1/includes/specials/SpecialChangePassword.php
> >
> > Release announcement:
> >
> http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-March/000145.html
> >
> > Wikimedia bug:
> > https://bugzilla.wikimedia.org/show_bug.cgi?id=62497
>
>
> That looks like a session-fixation bug to me; not a CSRF... and
> therefore it's the wrong control: the session-id should be "renewed",
> that's all.
>
> Florent
>

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.