Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2012-4381
Analyzed
More InfoOfficial Page
Source-secalert@redhat.com
View Known Exploited Vulnerability (KEV) details
Published At-08 Feb, 2020 | 18:15
Updated At-12 Feb, 2020 | 18:48

MediaWiki before 1.18.5, and 1.19.x before 1.19.2 saves passwords in the local database, (1) which could make it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack or, (2) when an authentication plugin returns a false in the strict function, could allow remote attackers to use old passwords for non-existing accounts in an external authentication system via unspecified vectors.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.18.1HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Primary2.09.3HIGH
AV:N/AC:M/Au:N/C:C/I:C/A:C
Type: Primary
Version: 3.1
Base score: 8.1
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 9.3
Base severity: HIGH
Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C
CPE Matches

Wikimedia Foundation
mediawiki
>>mediawiki>>Versions before 1.18.5(exclusive)
cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*
Wikimedia Foundation
mediawiki
>>mediawiki>>Versions from 1.19.0(inclusive) to 1.19.2(exclusive)
cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-798Primarynvd@nist.gov
CWE ID: CWE-798
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://osvdb.org/show/osvdb/85106secalert@redhat.com
Broken Link
http://www.openwall.com/lists/oss-security/2012/08/31/10secalert@redhat.com
Mailing List
Patch
Third Party Advisory
http://www.openwall.com/lists/oss-security/2012/08/31/6secalert@redhat.com
Mailing List
Patch
Third Party Advisory
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330secalert@redhat.com
Mailing List
Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=853442secalert@redhat.com
Issue Tracking
Patch
Third Party Advisory
https://lists.wikimedia.org/pipermail/mediawiki-announce/2012-August/000119.htmlsecalert@redhat.com
Patch
Release Notes
Vendor Advisory
https://phabricator.wikimedia.org/T41184secalert@redhat.com
Patch
Vendor Advisory
Hyperlink: http://osvdb.org/show/osvdb/85106
Source: secalert@redhat.com
Resource:
Broken Link
Hyperlink: http://www.openwall.com/lists/oss-security/2012/08/31/10
Source: secalert@redhat.com
Resource:
Mailing List
Patch
Third Party Advisory
Hyperlink: http://www.openwall.com/lists/oss-security/2012/08/31/6
Source: secalert@redhat.com
Resource:
Mailing List
Patch
Third Party Advisory
Hyperlink: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330
Source: secalert@redhat.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=853442
Source: secalert@redhat.com
Resource:
Issue Tracking
Patch
Third Party Advisory
Hyperlink: https://lists.wikimedia.org/pipermail/mediawiki-announce/2012-August/000119.html
Source: secalert@redhat.com
Resource:
Patch
Release Notes
Vendor Advisory
Hyperlink: https://phabricator.wikimedia.org/T41184
Source: secalert@redhat.com
Resource:
Patch
Vendor Advisory
Change History
0Changes found

Details not found