Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-0505 (GCVE-0-2018-0505)
Vulnerability from cvelistv5
- Authentication bypass
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:28:11.001Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[wikitech-l] 20180920 Security release: 1.27.5 / 1.29.3 / 1.30.1 / 1.31.1", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2018-September/090849.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://phabricator.wikimedia.org/T194605" }, { "name": "1041695", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1041695" }, { "name": "DSA-4301", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4301" }, { "name": "RHSA-2019:3142", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:3142" }, { "name": "RHSA-2019:3238", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:3238" }, { "name": "RHSA-2019:3813", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:3813" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "mediawiki", "vendor": "mediawiki", "versions": [ { "status": "affected", "version": "before 1.31.1, 1.30.1, 1.29.3 and 1.27.5" } ] } ], "datePublic": "2018-09-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Mediawiki 1.31 before 1.31.1, 1.30.1, 1.29.3 and 1.27.5 contains a flaw where BotPasswords can bypass CentralAuth\u0027s account lock" } ], "problemTypes": [ { "descriptions": [ { "description": "Authentication bypass", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-07T18:06:38", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "name": "[wikitech-l] 20180920 Security release: 1.27.5 / 1.29.3 / 1.30.1 / 1.31.1", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2018-September/090849.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://phabricator.wikimedia.org/T194605" }, { "name": "1041695", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1041695" }, { "name": "DSA-4301", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4301" }, { "name": "RHSA-2019:3142", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:3142" }, { "name": "RHSA-2019:3238", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:3238" }, { "name": "RHSA-2019:3813", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:3813" } ], "source": { "discovery": "UNKNOWN" }, "title": "BotPasswords can bypass CentralAuth\u0027s account lock", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "DATE_PUBLIC": "2018-09-20T21:18:00.000Z", "ID": "CVE-2018-0505", "STATE": "PUBLIC", "TITLE": "BotPasswords can bypass CentralAuth\u0027s account lock" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "mediawiki", "version": { "version_data": [ { "version_value": "before 1.31.1, 1.30.1, 1.29.3 and 1.27.5" } ] } } ] }, "vendor_name": "mediawiki" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Mediawiki 1.31 before 1.31.1, 1.30.1, 1.29.3 and 1.27.5 contains a flaw where BotPasswords can bypass CentralAuth\u0027s account lock" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Authentication bypass" } ] } ] }, "references": { "reference_data": [ { "name": "[wikitech-l] 20180920 Security release: 1.27.5 / 1.29.3 / 1.30.1 / 1.31.1", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2018-September/090849.html" }, { "name": "https://phabricator.wikimedia.org/T194605", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T194605" }, { "name": "1041695", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041695" }, { "name": "DSA-4301", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4301" }, { "name": "RHSA-2019:3142", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3142" }, { "name": "RHSA-2019:3238", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3238" }, { "name": "RHSA-2019:3813", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3813" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2018-0505", "datePublished": "2018-10-04T20:00:00Z", "dateReserved": "2017-11-27T00:00:00", "dateUpdated": "2024-09-16T18:48:38.021Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2018-0505\",\"sourceIdentifier\":\"security@debian.org\",\"published\":\"2018-10-04T20:29:00.687\",\"lastModified\":\"2024-11-21T03:38:22.430\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Mediawiki 1.31 before 1.31.1, 1.30.1, 1.29.3 and 1.27.5 contains a flaw where BotPasswords can bypass CentralAuth\u0027s account lock\"},{\"lang\":\"es\",\"value\":\"Mediawiki en versiones 1.31 anteriores a la 1.31.1, 1.30.1, 1.29.3 y 1.27.5 contiene un fallo en el que BotPasswords puede omitir el bloqueo de cuenta de CentratlAuth.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:N/I:P/A:N\",\"baseScore\":4.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-287\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.31.0\",\"versionEndExcluding\":\"1.31.1\",\"matchCriteriaId\":\"FB2A2066-8996-48B5-A5F8-E08443D24B7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mediawiki:mediawiki:1.27.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22E2BE13-CEE0-42ED-BC24-C5ED4EDBAF6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mediawiki:mediawiki:1.29.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD65E2E1-4634-4AE4-9631-4C3352991263\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mediawiki:mediawiki:1.30.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F24125C-A1AD-4CED-953F-E2D942AB02FA\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]}],\"references\":[{\"url\":\"http://www.securitytracker.com/id/1041695\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3142\",\"source\":\"security@debian.org\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3238\",\"source\":\"security@debian.org\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3813\",\"source\":\"security@debian.org\"},{\"url\":\"https://lists.wikimedia.org/pipermail/wikitech-l/2018-September/090849.html\",\"source\":\"security@debian.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://phabricator.wikimedia.org/T194605\",\"source\":\"security@debian.org\",\"tags\":[\"Exploit\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4301\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securitytracker.com/id/1041695\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3142\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3238\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3813\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.wikimedia.org/pipermail/wikitech-l/2018-September/090849.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://phabricator.wikimedia.org/T194605\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4301\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
rhsa-2019_3142
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for mediawiki is now available for Red Hat OpenShift Container Platform 3.11.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains an updated mediawiki RPM package for Red Hat OpenShift Container Platform 3.11.\n\nSecurity Fix(es):\n\n* mediawiki: $wgRateLimits (rate limit / ping limiter) entry for \u0027user\u0027 overrides that for \u0027newbie\u0027 (CVE-2018-0503)\n\n* mediawiki: BotPassword can bypass CentralAuth\u0027s account lock (CVE-2018-0505)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:3142", "url": "https://access.redhat.com/errata/RHSA-2019:3142" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "1634161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1634161" }, { "category": "external", "summary": "1634166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1634166" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3142.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 3.11 mediawiki security update", "tracking": { "current_release_date": "2024-11-22T13:52:11+00:00", "generator": { "date": "2024-11-22T13:52:11+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2019:3142", "initial_release_date": "2019-10-18T01:32:19+00:00", "revision_history": [ { "date": "2019-10-18T01:32:19+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-10-18T01:32:19+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T13:52:11+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 3.11", "product": { "name": "Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:3.11::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "mediawiki-0:1.27.7-1.el7.noarch", "product": { "name": "mediawiki-0:1.27.7-1.el7.noarch", "product_id": "mediawiki-0:1.27.7-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/mediawiki@1.27.7-1.el7?arch=noarch" } } }, { "category": "product_version", "name": "mediawiki-doc-0:1.27.7-1.el7.noarch", "product": { "name": "mediawiki-doc-0:1.27.7-1.el7.noarch", "product_id": "mediawiki-doc-0:1.27.7-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/mediawiki-doc@1.27.7-1.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "mediawiki-0:1.27.7-1.el7.src", "product": { "name": "mediawiki-0:1.27.7-1.el7.src", "product_id": "mediawiki-0:1.27.7-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mediawiki@1.27.7-1.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "mediawiki-0:1.27.7-1.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.noarch" }, "product_reference": "mediawiki-0:1.27.7-1.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "mediawiki-0:1.27.7-1.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.src" }, "product_reference": "mediawiki-0:1.27.7-1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "mediawiki-doc-0:1.27.7-1.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:mediawiki-doc-0:1.27.7-1.el7.noarch" }, "product_reference": "mediawiki-doc-0:1.27.7-1.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-0503", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2018-09-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1634161" } ], "notes": [ { "category": "description", "text": "Mediawiki 1.31 before 1.31.1, 1.30.1, 1.29.3 and 1.27.5 contains a flaw where contrary to the documentation, $wgRateLimits entry for \u0027user\u0027 overrides that for \u0027newbie\u0027.", "title": "Vulnerability description" }, { "category": "summary", "text": "mediawiki: $wgRateLimits (rate limit / ping limiter) entry for \u0027user\u0027 overrides that for \u0027newbie\u0027", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-doc-0:1.27.7-1.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-0503" }, { "category": "external", "summary": "RHBZ#1634161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1634161" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-0503", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0503" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0503", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0503" } ], "release_date": "2018-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-18T01:32:19+00:00", "details": "See the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-doc-0:1.27.7-1.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3142" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-doc-0:1.27.7-1.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "mediawiki: $wgRateLimits (rate limit / ping limiter) entry for \u0027user\u0027 overrides that for \u0027newbie\u0027" }, { "cve": "CVE-2018-0505", "cwe": { "id": "CWE-285", "name": "Improper Authorization" }, "discovery_date": "2018-09-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1634166" } ], "notes": [ { "category": "description", "text": "Mediawiki 1.31 before 1.31.1, 1.30.1, 1.29.3 and 1.27.5 contains a flaw where BotPasswords can bypass CentralAuth\u0027s account lock", "title": "Vulnerability description" }, { "category": "summary", "text": "mediawiki: BotPassword can bypass CentralAuth\u0027s account lock", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-doc-0:1.27.7-1.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-0505" }, { "category": "external", "summary": "RHBZ#1634166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1634166" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-0505", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0505" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0505", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0505" } ], "release_date": "2018-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-18T01:32:19+00:00", "details": "See the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-doc-0:1.27.7-1.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3142" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-doc-0:1.27.7-1.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "mediawiki: BotPassword can bypass CentralAuth\u0027s account lock" } ] }
rhsa-2019:3813
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for mediawiki123 is now available for Red Hat OpenShift Container Platform 3.9.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the mediawiki123 RPM package for Red Hat OpenShift Container Platform 3.9.102.\n\nSecurity Fix(es):\n\n* mediawiki: $wgRateLimits (rate limit / ping limiter) entry for \u0027user\u0027 overrides that for \u0027newbie\u0027 (CVE-2018-0503)\n\n* mediawiki: Information exposure when a log event is (partially) hidden (CVE-2018-0504)\n\n* mediawiki: BotPassword can bypass CentralAuth\u0027s account lock (CVE-2018-0505)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:3813", "url": "https://access.redhat.com/errata/RHSA-2019:3813" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "1634161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1634161" }, { "category": "external", "summary": "1634166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1634166" }, { "category": "external", "summary": "1634168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1634168" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3813.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 3.9 mediawiki123 security update", "tracking": { "current_release_date": "2025-09-25T12:13:57+00:00", "generator": { "date": "2025-09-25T12:13:57+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.8" } }, "id": "RHSA-2019:3813", "initial_release_date": "2019-11-07T16:55:22+00:00", "revision_history": [ { "date": "2019-11-07T16:55:22+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-11-07T16:55:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-25T12:13:57+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 3.9", "product": { "name": "Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:3.9::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "mediawiki123-0:1.23.17-1.el7.noarch", "product": { "name": "mediawiki123-0:1.23.17-1.el7.noarch", "product_id": "mediawiki123-0:1.23.17-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/mediawiki123@1.23.17-1.el7?arch=noarch" } } }, { "category": "product_version", "name": "mediawiki123-doc-0:1.23.17-1.el7.noarch", "product": { "name": "mediawiki123-doc-0:1.23.17-1.el7.noarch", "product_id": "mediawiki123-doc-0:1.23.17-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/mediawiki123-doc@1.23.17-1.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "mediawiki123-0:1.23.17-1.el7.src", "product": { "name": "mediawiki123-0:1.23.17-1.el7.src", "product_id": "mediawiki123-0:1.23.17-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mediawiki123@1.23.17-1.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "mediawiki123-0:1.23.17-1.el7.noarch as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.noarch" }, "product_reference": "mediawiki123-0:1.23.17-1.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "mediawiki123-0:1.23.17-1.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.src" }, "product_reference": "mediawiki123-0:1.23.17-1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "mediawiki123-doc-0:1.23.17-1.el7.noarch as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:mediawiki123-doc-0:1.23.17-1.el7.noarch" }, "product_reference": "mediawiki123-doc-0:1.23.17-1.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-0503", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2018-09-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1634161" } ], "notes": [ { "category": "description", "text": "Mediawiki 1.31 before 1.31.1, 1.30.1, 1.29.3 and 1.27.5 contains a flaw where contrary to the documentation, $wgRateLimits entry for \u0027user\u0027 overrides that for \u0027newbie\u0027.", "title": "Vulnerability description" }, { "category": "summary", "text": "mediawiki: $wgRateLimits (rate limit / ping limiter) entry for \u0027user\u0027 overrides that for \u0027newbie\u0027", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.noarch", "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.src", "7Server-RH7-RHOSE-3.9:mediawiki123-doc-0:1.23.17-1.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-0503" }, { "category": "external", "summary": "RHBZ#1634161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1634161" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-0503", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0503" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0503", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0503" } ], "release_date": "2018-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-07T16:55:22+00:00", "details": "For OpenShift Container Platform 3.9 see the following documentation, which\nwill be updated shortly for release 3.9.102, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/3.9/release_notes/ocp_3_9_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.noarch", "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.src", "7Server-RH7-RHOSE-3.9:mediawiki123-doc-0:1.23.17-1.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3813" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.noarch", "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.src", "7Server-RH7-RHOSE-3.9:mediawiki123-doc-0:1.23.17-1.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "mediawiki: $wgRateLimits (rate limit / ping limiter) entry for \u0027user\u0027 overrides that for \u0027newbie\u0027" }, { "cve": "CVE-2018-0504", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-09-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1634168" } ], "notes": [ { "category": "description", "text": "Mediawiki 1.31 before 1.31.1, 1.30.1, 1.29.3 and 1.27.5 contains an information disclosure flaw in the Special:Redirect/logid", "title": "Vulnerability description" }, { "category": "summary", "text": "mediawiki: Information exposure when a log event is (partially) hidden", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.noarch", "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.src", "7Server-RH7-RHOSE-3.9:mediawiki123-doc-0:1.23.17-1.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-0504" }, { "category": "external", "summary": "RHBZ#1634168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1634168" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-0504", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0504" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0504", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0504" } ], "release_date": "2018-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-07T16:55:22+00:00", "details": "For OpenShift Container Platform 3.9 see the following documentation, which\nwill be updated shortly for release 3.9.102, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/3.9/release_notes/ocp_3_9_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.noarch", "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.src", "7Server-RH7-RHOSE-3.9:mediawiki123-doc-0:1.23.17-1.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3813" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.noarch", "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.src", "7Server-RH7-RHOSE-3.9:mediawiki123-doc-0:1.23.17-1.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "mediawiki: Information exposure when a log event is (partially) hidden" }, { "cve": "CVE-2018-0505", "cwe": { "id": "CWE-285", "name": "Improper Authorization" }, "discovery_date": "2018-09-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1634166" } ], "notes": [ { "category": "description", "text": "Mediawiki 1.31 before 1.31.1, 1.30.1, 1.29.3 and 1.27.5 contains a flaw where BotPasswords can bypass CentralAuth\u0027s account lock", "title": "Vulnerability description" }, { "category": "summary", "text": "mediawiki: BotPassword can bypass CentralAuth\u0027s account lock", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.noarch", "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.src", "7Server-RH7-RHOSE-3.9:mediawiki123-doc-0:1.23.17-1.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-0505" }, { "category": "external", "summary": "RHBZ#1634166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1634166" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-0505", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0505" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0505", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0505" } ], "release_date": "2018-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-07T16:55:22+00:00", "details": "For OpenShift Container Platform 3.9 see the following documentation, which\nwill be updated shortly for release 3.9.102, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/3.9/release_notes/ocp_3_9_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.noarch", "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.src", "7Server-RH7-RHOSE-3.9:mediawiki123-doc-0:1.23.17-1.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3813" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.noarch", "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.src", "7Server-RH7-RHOSE-3.9:mediawiki123-doc-0:1.23.17-1.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "mediawiki: BotPassword can bypass CentralAuth\u0027s account lock" } ] }
RHSA-2019:3142
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for mediawiki is now available for Red Hat OpenShift Container Platform 3.11.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains an updated mediawiki RPM package for Red Hat OpenShift Container Platform 3.11.\n\nSecurity Fix(es):\n\n* mediawiki: $wgRateLimits (rate limit / ping limiter) entry for \u0027user\u0027 overrides that for \u0027newbie\u0027 (CVE-2018-0503)\n\n* mediawiki: BotPassword can bypass CentralAuth\u0027s account lock (CVE-2018-0505)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:3142", "url": "https://access.redhat.com/errata/RHSA-2019:3142" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "1634161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1634161" }, { "category": "external", "summary": "1634166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1634166" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3142.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 3.11 mediawiki security update", "tracking": { "current_release_date": "2025-09-25T12:12:53+00:00", "generator": { "date": "2025-09-25T12:12:53+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.8" } }, "id": "RHSA-2019:3142", "initial_release_date": "2019-10-18T01:32:19+00:00", "revision_history": [ { "date": "2019-10-18T01:32:19+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-10-18T01:32:19+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-25T12:12:53+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 3.11", "product": { "name": "Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:3.11::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "mediawiki-0:1.27.7-1.el7.noarch", "product": { "name": "mediawiki-0:1.27.7-1.el7.noarch", "product_id": "mediawiki-0:1.27.7-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/mediawiki@1.27.7-1.el7?arch=noarch" } } }, { "category": "product_version", "name": "mediawiki-doc-0:1.27.7-1.el7.noarch", "product": { "name": "mediawiki-doc-0:1.27.7-1.el7.noarch", "product_id": "mediawiki-doc-0:1.27.7-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/mediawiki-doc@1.27.7-1.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "mediawiki-0:1.27.7-1.el7.src", "product": { "name": "mediawiki-0:1.27.7-1.el7.src", "product_id": "mediawiki-0:1.27.7-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mediawiki@1.27.7-1.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "mediawiki-0:1.27.7-1.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.noarch" }, "product_reference": "mediawiki-0:1.27.7-1.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "mediawiki-0:1.27.7-1.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.src" }, "product_reference": "mediawiki-0:1.27.7-1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "mediawiki-doc-0:1.27.7-1.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:mediawiki-doc-0:1.27.7-1.el7.noarch" }, "product_reference": "mediawiki-doc-0:1.27.7-1.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-0503", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2018-09-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1634161" } ], "notes": [ { "category": "description", "text": "Mediawiki 1.31 before 1.31.1, 1.30.1, 1.29.3 and 1.27.5 contains a flaw where contrary to the documentation, $wgRateLimits entry for \u0027user\u0027 overrides that for \u0027newbie\u0027.", "title": "Vulnerability description" }, { "category": "summary", "text": "mediawiki: $wgRateLimits (rate limit / ping limiter) entry for \u0027user\u0027 overrides that for \u0027newbie\u0027", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-doc-0:1.27.7-1.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-0503" }, { "category": "external", "summary": "RHBZ#1634161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1634161" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-0503", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0503" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0503", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0503" } ], "release_date": "2018-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-18T01:32:19+00:00", "details": "See the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-doc-0:1.27.7-1.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3142" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-doc-0:1.27.7-1.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "mediawiki: $wgRateLimits (rate limit / ping limiter) entry for \u0027user\u0027 overrides that for \u0027newbie\u0027" }, { "cve": "CVE-2018-0505", "cwe": { "id": "CWE-285", "name": "Improper Authorization" }, "discovery_date": "2018-09-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1634166" } ], "notes": [ { "category": "description", "text": "Mediawiki 1.31 before 1.31.1, 1.30.1, 1.29.3 and 1.27.5 contains a flaw where BotPasswords can bypass CentralAuth\u0027s account lock", "title": "Vulnerability description" }, { "category": "summary", "text": "mediawiki: BotPassword can bypass CentralAuth\u0027s account lock", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-doc-0:1.27.7-1.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-0505" }, { "category": "external", "summary": "RHBZ#1634166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1634166" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-0505", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0505" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0505", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0505" } ], "release_date": "2018-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-18T01:32:19+00:00", "details": "See the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-doc-0:1.27.7-1.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3142" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-doc-0:1.27.7-1.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "mediawiki: BotPassword can bypass CentralAuth\u0027s account lock" } ] }
rhsa-2019_3238
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for mediawiki is now available for Red Hat OpenShift\nContainer Platform 3.10.\n\nRed Hat Product Security has rated this update as having a security impact\nof Low. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nSecurity Fix(es):\n\n* mediawiki: $wgRateLimits (rate limit / ping limiter) entry for \u0027user\u0027 overrides that for \u0027newbie\u0027 (CVE-2018-0503)\n\n* mediawiki: Information exposure when a log event is (partially) hidden (CVE-2018-0504)\n\n* mediawiki: BotPassword can bypass CentralAuth\u0027s account lock (CVE-2018-0505)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:3238", "url": "https://access.redhat.com/errata/RHSA-2019:3238" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "1634161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1634161" }, { "category": "external", "summary": "1634166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1634166" }, { "category": "external", "summary": "1634168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1634168" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3238.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 3.10 mediawiki security update", "tracking": { "current_release_date": "2024-11-22T13:53:16+00:00", "generator": { "date": "2024-11-22T13:53:16+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2019:3238", "initial_release_date": "2019-10-29T16:10:29+00:00", "revision_history": [ { "date": "2019-10-29T16:10:29+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-10-29T16:10:29+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T13:53:16+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 3.10", "product": { "name": "Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:3.10::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "mediawiki-0:1.27.7-1.el7.noarch", "product": { "name": "mediawiki-0:1.27.7-1.el7.noarch", "product_id": "mediawiki-0:1.27.7-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/mediawiki@1.27.7-1.el7?arch=noarch" } } }, { "category": "product_version", "name": "mediawiki-doc-0:1.27.7-1.el7.noarch", "product": { "name": "mediawiki-doc-0:1.27.7-1.el7.noarch", "product_id": "mediawiki-doc-0:1.27.7-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/mediawiki-doc@1.27.7-1.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "mediawiki-0:1.27.7-1.el7.src", "product": { "name": "mediawiki-0:1.27.7-1.el7.src", "product_id": "mediawiki-0:1.27.7-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mediawiki@1.27.7-1.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "mediawiki-0:1.27.7-1.el7.noarch as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.noarch" }, "product_reference": "mediawiki-0:1.27.7-1.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "mediawiki-0:1.27.7-1.el7.src as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.src" }, "product_reference": "mediawiki-0:1.27.7-1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "mediawiki-doc-0:1.27.7-1.el7.noarch as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:mediawiki-doc-0:1.27.7-1.el7.noarch" }, "product_reference": "mediawiki-doc-0:1.27.7-1.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-0503", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2018-09-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1634161" } ], "notes": [ { "category": "description", "text": "Mediawiki 1.31 before 1.31.1, 1.30.1, 1.29.3 and 1.27.5 contains a flaw where contrary to the documentation, $wgRateLimits entry for \u0027user\u0027 overrides that for \u0027newbie\u0027.", "title": "Vulnerability description" }, { "category": "summary", "text": "mediawiki: $wgRateLimits (rate limit / ping limiter) entry for \u0027user\u0027 overrides that for \u0027newbie\u0027", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.10:mediawiki-doc-0:1.27.7-1.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-0503" }, { "category": "external", "summary": "RHBZ#1634161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1634161" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-0503", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0503" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0503", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0503" } ], "release_date": "2018-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-29T16:10:29+00:00", "details": "For OpenShift Container Platform 3.10 see the following documentation,\nwhich will be updated shortly for release 3.10.181, for important\ninstructions on how to upgrade your cluster and fully apply this\nasynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.10/release_notes/ocp_3_10_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.10:mediawiki-doc-0:1.27.7-1.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3238" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.10:mediawiki-doc-0:1.27.7-1.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "mediawiki: $wgRateLimits (rate limit / ping limiter) entry for \u0027user\u0027 overrides that for \u0027newbie\u0027" }, { "cve": "CVE-2018-0504", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-09-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1634168" } ], "notes": [ { "category": "description", "text": "Mediawiki 1.31 before 1.31.1, 1.30.1, 1.29.3 and 1.27.5 contains an information disclosure flaw in the Special:Redirect/logid", "title": "Vulnerability description" }, { "category": "summary", "text": "mediawiki: Information exposure when a log event is (partially) hidden", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.10:mediawiki-doc-0:1.27.7-1.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-0504" }, { "category": "external", "summary": "RHBZ#1634168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1634168" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-0504", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0504" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0504", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0504" } ], "release_date": "2018-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-29T16:10:29+00:00", "details": "For OpenShift Container Platform 3.10 see the following documentation,\nwhich will be updated shortly for release 3.10.181, for important\ninstructions on how to upgrade your cluster and fully apply this\nasynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.10/release_notes/ocp_3_10_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.10:mediawiki-doc-0:1.27.7-1.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3238" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.10:mediawiki-doc-0:1.27.7-1.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "mediawiki: Information exposure when a log event is (partially) hidden" }, { "cve": "CVE-2018-0505", "cwe": { "id": "CWE-285", "name": "Improper Authorization" }, "discovery_date": "2018-09-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1634166" } ], "notes": [ { "category": "description", "text": "Mediawiki 1.31 before 1.31.1, 1.30.1, 1.29.3 and 1.27.5 contains a flaw where BotPasswords can bypass CentralAuth\u0027s account lock", "title": "Vulnerability description" }, { "category": "summary", "text": "mediawiki: BotPassword can bypass CentralAuth\u0027s account lock", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.10:mediawiki-doc-0:1.27.7-1.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-0505" }, { "category": "external", "summary": "RHBZ#1634166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1634166" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-0505", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0505" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0505", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0505" } ], "release_date": "2018-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-29T16:10:29+00:00", "details": "For OpenShift Container Platform 3.10 see the following documentation,\nwhich will be updated shortly for release 3.10.181, for important\ninstructions on how to upgrade your cluster and fully apply this\nasynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.10/release_notes/ocp_3_10_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.10:mediawiki-doc-0:1.27.7-1.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3238" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.10:mediawiki-doc-0:1.27.7-1.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "mediawiki: BotPassword can bypass CentralAuth\u0027s account lock" } ] }
rhsa-2019_3813
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for mediawiki123 is now available for Red Hat OpenShift Container Platform 3.9.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the mediawiki123 RPM package for Red Hat OpenShift Container Platform 3.9.102.\n\nSecurity Fix(es):\n\n* mediawiki: $wgRateLimits (rate limit / ping limiter) entry for \u0027user\u0027 overrides that for \u0027newbie\u0027 (CVE-2018-0503)\n\n* mediawiki: Information exposure when a log event is (partially) hidden (CVE-2018-0504)\n\n* mediawiki: BotPassword can bypass CentralAuth\u0027s account lock (CVE-2018-0505)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:3813", "url": "https://access.redhat.com/errata/RHSA-2019:3813" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "1634161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1634161" }, { "category": "external", "summary": "1634166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1634166" }, { "category": "external", "summary": "1634168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1634168" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3813.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 3.9 mediawiki123 security update", "tracking": { "current_release_date": "2024-11-22T13:53:22+00:00", "generator": { "date": "2024-11-22T13:53:22+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2019:3813", "initial_release_date": "2019-11-07T16:55:22+00:00", "revision_history": [ { "date": "2019-11-07T16:55:22+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-11-07T16:55:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T13:53:22+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 3.9", "product": { "name": "Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:3.9::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "mediawiki123-0:1.23.17-1.el7.noarch", "product": { "name": "mediawiki123-0:1.23.17-1.el7.noarch", "product_id": "mediawiki123-0:1.23.17-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/mediawiki123@1.23.17-1.el7?arch=noarch" } } }, { "category": "product_version", "name": "mediawiki123-doc-0:1.23.17-1.el7.noarch", "product": { "name": "mediawiki123-doc-0:1.23.17-1.el7.noarch", "product_id": "mediawiki123-doc-0:1.23.17-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/mediawiki123-doc@1.23.17-1.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "mediawiki123-0:1.23.17-1.el7.src", "product": { "name": "mediawiki123-0:1.23.17-1.el7.src", "product_id": "mediawiki123-0:1.23.17-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mediawiki123@1.23.17-1.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "mediawiki123-0:1.23.17-1.el7.noarch as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.noarch" }, "product_reference": "mediawiki123-0:1.23.17-1.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "mediawiki123-0:1.23.17-1.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.src" }, "product_reference": "mediawiki123-0:1.23.17-1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "mediawiki123-doc-0:1.23.17-1.el7.noarch as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:mediawiki123-doc-0:1.23.17-1.el7.noarch" }, "product_reference": "mediawiki123-doc-0:1.23.17-1.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-0503", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2018-09-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1634161" } ], "notes": [ { "category": "description", "text": "Mediawiki 1.31 before 1.31.1, 1.30.1, 1.29.3 and 1.27.5 contains a flaw where contrary to the documentation, $wgRateLimits entry for \u0027user\u0027 overrides that for \u0027newbie\u0027.", "title": "Vulnerability description" }, { "category": "summary", "text": "mediawiki: $wgRateLimits (rate limit / ping limiter) entry for \u0027user\u0027 overrides that for \u0027newbie\u0027", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.noarch", "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.src", "7Server-RH7-RHOSE-3.9:mediawiki123-doc-0:1.23.17-1.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-0503" }, { "category": "external", "summary": "RHBZ#1634161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1634161" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-0503", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0503" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0503", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0503" } ], "release_date": "2018-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-07T16:55:22+00:00", "details": "For OpenShift Container Platform 3.9 see the following documentation, which\nwill be updated shortly for release 3.9.102, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/3.9/release_notes/ocp_3_9_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.noarch", "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.src", "7Server-RH7-RHOSE-3.9:mediawiki123-doc-0:1.23.17-1.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3813" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.noarch", "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.src", "7Server-RH7-RHOSE-3.9:mediawiki123-doc-0:1.23.17-1.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "mediawiki: $wgRateLimits (rate limit / ping limiter) entry for \u0027user\u0027 overrides that for \u0027newbie\u0027" }, { "cve": "CVE-2018-0504", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-09-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1634168" } ], "notes": [ { "category": "description", "text": "Mediawiki 1.31 before 1.31.1, 1.30.1, 1.29.3 and 1.27.5 contains an information disclosure flaw in the Special:Redirect/logid", "title": "Vulnerability description" }, { "category": "summary", "text": "mediawiki: Information exposure when a log event is (partially) hidden", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.noarch", "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.src", "7Server-RH7-RHOSE-3.9:mediawiki123-doc-0:1.23.17-1.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-0504" }, { "category": "external", "summary": "RHBZ#1634168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1634168" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-0504", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0504" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0504", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0504" } ], "release_date": "2018-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-07T16:55:22+00:00", "details": "For OpenShift Container Platform 3.9 see the following documentation, which\nwill be updated shortly for release 3.9.102, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/3.9/release_notes/ocp_3_9_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.noarch", "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.src", "7Server-RH7-RHOSE-3.9:mediawiki123-doc-0:1.23.17-1.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3813" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.noarch", "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.src", "7Server-RH7-RHOSE-3.9:mediawiki123-doc-0:1.23.17-1.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "mediawiki: Information exposure when a log event is (partially) hidden" }, { "cve": "CVE-2018-0505", "cwe": { "id": "CWE-285", "name": "Improper Authorization" }, "discovery_date": "2018-09-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1634166" } ], "notes": [ { "category": "description", "text": "Mediawiki 1.31 before 1.31.1, 1.30.1, 1.29.3 and 1.27.5 contains a flaw where BotPasswords can bypass CentralAuth\u0027s account lock", "title": "Vulnerability description" }, { "category": "summary", "text": "mediawiki: BotPassword can bypass CentralAuth\u0027s account lock", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.noarch", "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.src", "7Server-RH7-RHOSE-3.9:mediawiki123-doc-0:1.23.17-1.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-0505" }, { "category": "external", "summary": "RHBZ#1634166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1634166" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-0505", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0505" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0505", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0505" } ], "release_date": "2018-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-07T16:55:22+00:00", "details": "For OpenShift Container Platform 3.9 see the following documentation, which\nwill be updated shortly for release 3.9.102, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/3.9/release_notes/ocp_3_9_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.noarch", "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.src", "7Server-RH7-RHOSE-3.9:mediawiki123-doc-0:1.23.17-1.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3813" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.noarch", "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.src", "7Server-RH7-RHOSE-3.9:mediawiki123-doc-0:1.23.17-1.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "mediawiki: BotPassword can bypass CentralAuth\u0027s account lock" } ] }
rhsa-2019:3142
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for mediawiki is now available for Red Hat OpenShift Container Platform 3.11.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains an updated mediawiki RPM package for Red Hat OpenShift Container Platform 3.11.\n\nSecurity Fix(es):\n\n* mediawiki: $wgRateLimits (rate limit / ping limiter) entry for \u0027user\u0027 overrides that for \u0027newbie\u0027 (CVE-2018-0503)\n\n* mediawiki: BotPassword can bypass CentralAuth\u0027s account lock (CVE-2018-0505)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:3142", "url": "https://access.redhat.com/errata/RHSA-2019:3142" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "1634161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1634161" }, { "category": "external", "summary": "1634166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1634166" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3142.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 3.11 mediawiki security update", "tracking": { "current_release_date": "2025-09-25T12:12:53+00:00", "generator": { "date": "2025-09-25T12:12:53+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.8" } }, "id": "RHSA-2019:3142", "initial_release_date": "2019-10-18T01:32:19+00:00", "revision_history": [ { "date": "2019-10-18T01:32:19+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-10-18T01:32:19+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-25T12:12:53+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 3.11", "product": { "name": "Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:3.11::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "mediawiki-0:1.27.7-1.el7.noarch", "product": { "name": "mediawiki-0:1.27.7-1.el7.noarch", "product_id": "mediawiki-0:1.27.7-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/mediawiki@1.27.7-1.el7?arch=noarch" } } }, { "category": "product_version", "name": "mediawiki-doc-0:1.27.7-1.el7.noarch", "product": { "name": "mediawiki-doc-0:1.27.7-1.el7.noarch", "product_id": "mediawiki-doc-0:1.27.7-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/mediawiki-doc@1.27.7-1.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "mediawiki-0:1.27.7-1.el7.src", "product": { "name": "mediawiki-0:1.27.7-1.el7.src", "product_id": "mediawiki-0:1.27.7-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mediawiki@1.27.7-1.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "mediawiki-0:1.27.7-1.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.noarch" }, "product_reference": "mediawiki-0:1.27.7-1.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "mediawiki-0:1.27.7-1.el7.src as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.src" }, "product_reference": "mediawiki-0:1.27.7-1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" }, { "category": "default_component_of", "full_product_name": { "name": "mediawiki-doc-0:1.27.7-1.el7.noarch as a component of Red Hat OpenShift Container Platform 3.11", "product_id": "7Server-RH7-RHOSE-3.11:mediawiki-doc-0:1.27.7-1.el7.noarch" }, "product_reference": "mediawiki-doc-0:1.27.7-1.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.11" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-0503", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2018-09-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1634161" } ], "notes": [ { "category": "description", "text": "Mediawiki 1.31 before 1.31.1, 1.30.1, 1.29.3 and 1.27.5 contains a flaw where contrary to the documentation, $wgRateLimits entry for \u0027user\u0027 overrides that for \u0027newbie\u0027.", "title": "Vulnerability description" }, { "category": "summary", "text": "mediawiki: $wgRateLimits (rate limit / ping limiter) entry for \u0027user\u0027 overrides that for \u0027newbie\u0027", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-doc-0:1.27.7-1.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-0503" }, { "category": "external", "summary": "RHBZ#1634161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1634161" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-0503", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0503" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0503", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0503" } ], "release_date": "2018-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-18T01:32:19+00:00", "details": "See the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-doc-0:1.27.7-1.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3142" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-doc-0:1.27.7-1.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "mediawiki: $wgRateLimits (rate limit / ping limiter) entry for \u0027user\u0027 overrides that for \u0027newbie\u0027" }, { "cve": "CVE-2018-0505", "cwe": { "id": "CWE-285", "name": "Improper Authorization" }, "discovery_date": "2018-09-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1634166" } ], "notes": [ { "category": "description", "text": "Mediawiki 1.31 before 1.31.1, 1.30.1, 1.29.3 and 1.27.5 contains a flaw where BotPasswords can bypass CentralAuth\u0027s account lock", "title": "Vulnerability description" }, { "category": "summary", "text": "mediawiki: BotPassword can bypass CentralAuth\u0027s account lock", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-doc-0:1.27.7-1.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-0505" }, { "category": "external", "summary": "RHBZ#1634166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1634166" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-0505", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0505" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0505", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0505" } ], "release_date": "2018-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-18T01:32:19+00:00", "details": "See the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-doc-0:1.27.7-1.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3142" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.11:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.11:mediawiki-doc-0:1.27.7-1.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "mediawiki: BotPassword can bypass CentralAuth\u0027s account lock" } ] }
rhsa-2019:3238
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for mediawiki is now available for Red Hat OpenShift\nContainer Platform 3.10.\n\nRed Hat Product Security has rated this update as having a security impact\nof Low. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nSecurity Fix(es):\n\n* mediawiki: $wgRateLimits (rate limit / ping limiter) entry for \u0027user\u0027 overrides that for \u0027newbie\u0027 (CVE-2018-0503)\n\n* mediawiki: Information exposure when a log event is (partially) hidden (CVE-2018-0504)\n\n* mediawiki: BotPassword can bypass CentralAuth\u0027s account lock (CVE-2018-0505)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:3238", "url": "https://access.redhat.com/errata/RHSA-2019:3238" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "1634161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1634161" }, { "category": "external", "summary": "1634166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1634166" }, { "category": "external", "summary": "1634168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1634168" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3238.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 3.10 mediawiki security update", "tracking": { "current_release_date": "2025-09-25T12:13:13+00:00", "generator": { "date": "2025-09-25T12:13:13+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.8" } }, "id": "RHSA-2019:3238", "initial_release_date": "2019-10-29T16:10:29+00:00", "revision_history": [ { "date": "2019-10-29T16:10:29+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-10-29T16:10:29+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-25T12:13:13+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 3.10", "product": { "name": "Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:3.10::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "mediawiki-0:1.27.7-1.el7.noarch", "product": { "name": "mediawiki-0:1.27.7-1.el7.noarch", "product_id": "mediawiki-0:1.27.7-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/mediawiki@1.27.7-1.el7?arch=noarch" } } }, { "category": "product_version", "name": "mediawiki-doc-0:1.27.7-1.el7.noarch", "product": { "name": "mediawiki-doc-0:1.27.7-1.el7.noarch", "product_id": "mediawiki-doc-0:1.27.7-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/mediawiki-doc@1.27.7-1.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "mediawiki-0:1.27.7-1.el7.src", "product": { "name": "mediawiki-0:1.27.7-1.el7.src", "product_id": "mediawiki-0:1.27.7-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mediawiki@1.27.7-1.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "mediawiki-0:1.27.7-1.el7.noarch as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.noarch" }, "product_reference": "mediawiki-0:1.27.7-1.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "mediawiki-0:1.27.7-1.el7.src as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.src" }, "product_reference": "mediawiki-0:1.27.7-1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "mediawiki-doc-0:1.27.7-1.el7.noarch as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:mediawiki-doc-0:1.27.7-1.el7.noarch" }, "product_reference": "mediawiki-doc-0:1.27.7-1.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-0503", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2018-09-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1634161" } ], "notes": [ { "category": "description", "text": "Mediawiki 1.31 before 1.31.1, 1.30.1, 1.29.3 and 1.27.5 contains a flaw where contrary to the documentation, $wgRateLimits entry for \u0027user\u0027 overrides that for \u0027newbie\u0027.", "title": "Vulnerability description" }, { "category": "summary", "text": "mediawiki: $wgRateLimits (rate limit / ping limiter) entry for \u0027user\u0027 overrides that for \u0027newbie\u0027", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.10:mediawiki-doc-0:1.27.7-1.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-0503" }, { "category": "external", "summary": "RHBZ#1634161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1634161" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-0503", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0503" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0503", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0503" } ], "release_date": "2018-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-29T16:10:29+00:00", "details": "For OpenShift Container Platform 3.10 see the following documentation,\nwhich will be updated shortly for release 3.10.181, for important\ninstructions on how to upgrade your cluster and fully apply this\nasynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.10/release_notes/ocp_3_10_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.10:mediawiki-doc-0:1.27.7-1.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3238" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.10:mediawiki-doc-0:1.27.7-1.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "mediawiki: $wgRateLimits (rate limit / ping limiter) entry for \u0027user\u0027 overrides that for \u0027newbie\u0027" }, { "cve": "CVE-2018-0504", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-09-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1634168" } ], "notes": [ { "category": "description", "text": "Mediawiki 1.31 before 1.31.1, 1.30.1, 1.29.3 and 1.27.5 contains an information disclosure flaw in the Special:Redirect/logid", "title": "Vulnerability description" }, { "category": "summary", "text": "mediawiki: Information exposure when a log event is (partially) hidden", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.10:mediawiki-doc-0:1.27.7-1.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-0504" }, { "category": "external", "summary": "RHBZ#1634168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1634168" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-0504", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0504" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0504", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0504" } ], "release_date": "2018-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-29T16:10:29+00:00", "details": "For OpenShift Container Platform 3.10 see the following documentation,\nwhich will be updated shortly for release 3.10.181, for important\ninstructions on how to upgrade your cluster and fully apply this\nasynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.10/release_notes/ocp_3_10_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.10:mediawiki-doc-0:1.27.7-1.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3238" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.10:mediawiki-doc-0:1.27.7-1.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "mediawiki: Information exposure when a log event is (partially) hidden" }, { "cve": "CVE-2018-0505", "cwe": { "id": "CWE-285", "name": "Improper Authorization" }, "discovery_date": "2018-09-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1634166" } ], "notes": [ { "category": "description", "text": "Mediawiki 1.31 before 1.31.1, 1.30.1, 1.29.3 and 1.27.5 contains a flaw where BotPasswords can bypass CentralAuth\u0027s account lock", "title": "Vulnerability description" }, { "category": "summary", "text": "mediawiki: BotPassword can bypass CentralAuth\u0027s account lock", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.10:mediawiki-doc-0:1.27.7-1.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-0505" }, { "category": "external", "summary": "RHBZ#1634166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1634166" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-0505", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0505" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0505", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0505" } ], "release_date": "2018-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-29T16:10:29+00:00", "details": "For OpenShift Container Platform 3.10 see the following documentation,\nwhich will be updated shortly for release 3.10.181, for important\ninstructions on how to upgrade your cluster and fully apply this\nasynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.10/release_notes/ocp_3_10_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.10:mediawiki-doc-0:1.27.7-1.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3238" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.10:mediawiki-doc-0:1.27.7-1.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "mediawiki: BotPassword can bypass CentralAuth\u0027s account lock" } ] }
RHSA-2019:3238
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for mediawiki is now available for Red Hat OpenShift\nContainer Platform 3.10.\n\nRed Hat Product Security has rated this update as having a security impact\nof Low. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nSecurity Fix(es):\n\n* mediawiki: $wgRateLimits (rate limit / ping limiter) entry for \u0027user\u0027 overrides that for \u0027newbie\u0027 (CVE-2018-0503)\n\n* mediawiki: Information exposure when a log event is (partially) hidden (CVE-2018-0504)\n\n* mediawiki: BotPassword can bypass CentralAuth\u0027s account lock (CVE-2018-0505)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:3238", "url": "https://access.redhat.com/errata/RHSA-2019:3238" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "1634161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1634161" }, { "category": "external", "summary": "1634166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1634166" }, { "category": "external", "summary": "1634168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1634168" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3238.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 3.10 mediawiki security update", "tracking": { "current_release_date": "2025-09-25T12:13:13+00:00", "generator": { "date": "2025-09-25T12:13:13+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.8" } }, "id": "RHSA-2019:3238", "initial_release_date": "2019-10-29T16:10:29+00:00", "revision_history": [ { "date": "2019-10-29T16:10:29+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-10-29T16:10:29+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-25T12:13:13+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 3.10", "product": { "name": "Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:3.10::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "mediawiki-0:1.27.7-1.el7.noarch", "product": { "name": "mediawiki-0:1.27.7-1.el7.noarch", "product_id": "mediawiki-0:1.27.7-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/mediawiki@1.27.7-1.el7?arch=noarch" } } }, { "category": "product_version", "name": "mediawiki-doc-0:1.27.7-1.el7.noarch", "product": { "name": "mediawiki-doc-0:1.27.7-1.el7.noarch", "product_id": "mediawiki-doc-0:1.27.7-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/mediawiki-doc@1.27.7-1.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "mediawiki-0:1.27.7-1.el7.src", "product": { "name": "mediawiki-0:1.27.7-1.el7.src", "product_id": "mediawiki-0:1.27.7-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mediawiki@1.27.7-1.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "mediawiki-0:1.27.7-1.el7.noarch as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.noarch" }, "product_reference": "mediawiki-0:1.27.7-1.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "mediawiki-0:1.27.7-1.el7.src as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.src" }, "product_reference": "mediawiki-0:1.27.7-1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" }, { "category": "default_component_of", "full_product_name": { "name": "mediawiki-doc-0:1.27.7-1.el7.noarch as a component of Red Hat OpenShift Container Platform 3.10", "product_id": "7Server-RH7-RHOSE-3.10:mediawiki-doc-0:1.27.7-1.el7.noarch" }, "product_reference": "mediawiki-doc-0:1.27.7-1.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.10" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-0503", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2018-09-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1634161" } ], "notes": [ { "category": "description", "text": "Mediawiki 1.31 before 1.31.1, 1.30.1, 1.29.3 and 1.27.5 contains a flaw where contrary to the documentation, $wgRateLimits entry for \u0027user\u0027 overrides that for \u0027newbie\u0027.", "title": "Vulnerability description" }, { "category": "summary", "text": "mediawiki: $wgRateLimits (rate limit / ping limiter) entry for \u0027user\u0027 overrides that for \u0027newbie\u0027", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.10:mediawiki-doc-0:1.27.7-1.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-0503" }, { "category": "external", "summary": "RHBZ#1634161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1634161" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-0503", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0503" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0503", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0503" } ], "release_date": "2018-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-29T16:10:29+00:00", "details": "For OpenShift Container Platform 3.10 see the following documentation,\nwhich will be updated shortly for release 3.10.181, for important\ninstructions on how to upgrade your cluster and fully apply this\nasynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.10/release_notes/ocp_3_10_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.10:mediawiki-doc-0:1.27.7-1.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3238" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.10:mediawiki-doc-0:1.27.7-1.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "mediawiki: $wgRateLimits (rate limit / ping limiter) entry for \u0027user\u0027 overrides that for \u0027newbie\u0027" }, { "cve": "CVE-2018-0504", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-09-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1634168" } ], "notes": [ { "category": "description", "text": "Mediawiki 1.31 before 1.31.1, 1.30.1, 1.29.3 and 1.27.5 contains an information disclosure flaw in the Special:Redirect/logid", "title": "Vulnerability description" }, { "category": "summary", "text": "mediawiki: Information exposure when a log event is (partially) hidden", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.10:mediawiki-doc-0:1.27.7-1.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-0504" }, { "category": "external", "summary": "RHBZ#1634168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1634168" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-0504", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0504" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0504", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0504" } ], "release_date": "2018-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-29T16:10:29+00:00", "details": "For OpenShift Container Platform 3.10 see the following documentation,\nwhich will be updated shortly for release 3.10.181, for important\ninstructions on how to upgrade your cluster and fully apply this\nasynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.10/release_notes/ocp_3_10_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.10:mediawiki-doc-0:1.27.7-1.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3238" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.10:mediawiki-doc-0:1.27.7-1.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "mediawiki: Information exposure when a log event is (partially) hidden" }, { "cve": "CVE-2018-0505", "cwe": { "id": "CWE-285", "name": "Improper Authorization" }, "discovery_date": "2018-09-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1634166" } ], "notes": [ { "category": "description", "text": "Mediawiki 1.31 before 1.31.1, 1.30.1, 1.29.3 and 1.27.5 contains a flaw where BotPasswords can bypass CentralAuth\u0027s account lock", "title": "Vulnerability description" }, { "category": "summary", "text": "mediawiki: BotPassword can bypass CentralAuth\u0027s account lock", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.10:mediawiki-doc-0:1.27.7-1.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-0505" }, { "category": "external", "summary": "RHBZ#1634166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1634166" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-0505", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0505" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0505", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0505" } ], "release_date": "2018-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-10-29T16:10:29+00:00", "details": "For OpenShift Container Platform 3.10 see the following documentation,\nwhich will be updated shortly for release 3.10.181, for important\ninstructions on how to upgrade your cluster and fully apply this\nasynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/3.10/release_notes/ocp_3_10_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.10:mediawiki-doc-0:1.27.7-1.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3238" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.noarch", "7Server-RH7-RHOSE-3.10:mediawiki-0:1.27.7-1.el7.src", "7Server-RH7-RHOSE-3.10:mediawiki-doc-0:1.27.7-1.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "mediawiki: BotPassword can bypass CentralAuth\u0027s account lock" } ] }
RHSA-2019:3813
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for mediawiki123 is now available for Red Hat OpenShift Container Platform 3.9.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the mediawiki123 RPM package for Red Hat OpenShift Container Platform 3.9.102.\n\nSecurity Fix(es):\n\n* mediawiki: $wgRateLimits (rate limit / ping limiter) entry for \u0027user\u0027 overrides that for \u0027newbie\u0027 (CVE-2018-0503)\n\n* mediawiki: Information exposure when a log event is (partially) hidden (CVE-2018-0504)\n\n* mediawiki: BotPassword can bypass CentralAuth\u0027s account lock (CVE-2018-0505)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:3813", "url": "https://access.redhat.com/errata/RHSA-2019:3813" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "1634161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1634161" }, { "category": "external", "summary": "1634166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1634166" }, { "category": "external", "summary": "1634168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1634168" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3813.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 3.9 mediawiki123 security update", "tracking": { "current_release_date": "2025-09-25T12:13:57+00:00", "generator": { "date": "2025-09-25T12:13:57+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.8" } }, "id": "RHSA-2019:3813", "initial_release_date": "2019-11-07T16:55:22+00:00", "revision_history": [ { "date": "2019-11-07T16:55:22+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-11-07T16:55:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-25T12:13:57+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 3.9", "product": { "name": "Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:3.9::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "mediawiki123-0:1.23.17-1.el7.noarch", "product": { "name": "mediawiki123-0:1.23.17-1.el7.noarch", "product_id": "mediawiki123-0:1.23.17-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/mediawiki123@1.23.17-1.el7?arch=noarch" } } }, { "category": "product_version", "name": "mediawiki123-doc-0:1.23.17-1.el7.noarch", "product": { "name": "mediawiki123-doc-0:1.23.17-1.el7.noarch", "product_id": "mediawiki123-doc-0:1.23.17-1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/mediawiki123-doc@1.23.17-1.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "mediawiki123-0:1.23.17-1.el7.src", "product": { "name": "mediawiki123-0:1.23.17-1.el7.src", "product_id": "mediawiki123-0:1.23.17-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mediawiki123@1.23.17-1.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "mediawiki123-0:1.23.17-1.el7.noarch as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.noarch" }, "product_reference": "mediawiki123-0:1.23.17-1.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "mediawiki123-0:1.23.17-1.el7.src as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.src" }, "product_reference": "mediawiki123-0:1.23.17-1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" }, { "category": "default_component_of", "full_product_name": { "name": "mediawiki123-doc-0:1.23.17-1.el7.noarch as a component of Red Hat OpenShift Container Platform 3.9", "product_id": "7Server-RH7-RHOSE-3.9:mediawiki123-doc-0:1.23.17-1.el7.noarch" }, "product_reference": "mediawiki123-doc-0:1.23.17-1.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-3.9" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-0503", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2018-09-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1634161" } ], "notes": [ { "category": "description", "text": "Mediawiki 1.31 before 1.31.1, 1.30.1, 1.29.3 and 1.27.5 contains a flaw where contrary to the documentation, $wgRateLimits entry for \u0027user\u0027 overrides that for \u0027newbie\u0027.", "title": "Vulnerability description" }, { "category": "summary", "text": "mediawiki: $wgRateLimits (rate limit / ping limiter) entry for \u0027user\u0027 overrides that for \u0027newbie\u0027", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.noarch", "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.src", "7Server-RH7-RHOSE-3.9:mediawiki123-doc-0:1.23.17-1.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-0503" }, { "category": "external", "summary": "RHBZ#1634161", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1634161" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-0503", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0503" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0503", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0503" } ], "release_date": "2018-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-07T16:55:22+00:00", "details": "For OpenShift Container Platform 3.9 see the following documentation, which\nwill be updated shortly for release 3.9.102, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/3.9/release_notes/ocp_3_9_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.noarch", "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.src", "7Server-RH7-RHOSE-3.9:mediawiki123-doc-0:1.23.17-1.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3813" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.noarch", "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.src", "7Server-RH7-RHOSE-3.9:mediawiki123-doc-0:1.23.17-1.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "mediawiki: $wgRateLimits (rate limit / ping limiter) entry for \u0027user\u0027 overrides that for \u0027newbie\u0027" }, { "cve": "CVE-2018-0504", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-09-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1634168" } ], "notes": [ { "category": "description", "text": "Mediawiki 1.31 before 1.31.1, 1.30.1, 1.29.3 and 1.27.5 contains an information disclosure flaw in the Special:Redirect/logid", "title": "Vulnerability description" }, { "category": "summary", "text": "mediawiki: Information exposure when a log event is (partially) hidden", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.noarch", "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.src", "7Server-RH7-RHOSE-3.9:mediawiki123-doc-0:1.23.17-1.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-0504" }, { "category": "external", "summary": "RHBZ#1634168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1634168" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-0504", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0504" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0504", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0504" } ], "release_date": "2018-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-07T16:55:22+00:00", "details": "For OpenShift Container Platform 3.9 see the following documentation, which\nwill be updated shortly for release 3.9.102, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/3.9/release_notes/ocp_3_9_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.noarch", "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.src", "7Server-RH7-RHOSE-3.9:mediawiki123-doc-0:1.23.17-1.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3813" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.noarch", "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.src", "7Server-RH7-RHOSE-3.9:mediawiki123-doc-0:1.23.17-1.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "mediawiki: Information exposure when a log event is (partially) hidden" }, { "cve": "CVE-2018-0505", "cwe": { "id": "CWE-285", "name": "Improper Authorization" }, "discovery_date": "2018-09-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1634166" } ], "notes": [ { "category": "description", "text": "Mediawiki 1.31 before 1.31.1, 1.30.1, 1.29.3 and 1.27.5 contains a flaw where BotPasswords can bypass CentralAuth\u0027s account lock", "title": "Vulnerability description" }, { "category": "summary", "text": "mediawiki: BotPassword can bypass CentralAuth\u0027s account lock", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.noarch", "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.src", "7Server-RH7-RHOSE-3.9:mediawiki123-doc-0:1.23.17-1.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-0505" }, { "category": "external", "summary": "RHBZ#1634166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1634166" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-0505", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0505" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0505", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0505" } ], "release_date": "2018-09-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-07T16:55:22+00:00", "details": "For OpenShift Container Platform 3.9 see the following documentation, which\nwill be updated shortly for release 3.9.102, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/3.9/release_notes/ocp_3_9_release_notes.html", "product_ids": [ "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.noarch", "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.src", "7Server-RH7-RHOSE-3.9:mediawiki123-doc-0:1.23.17-1.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2019:3813" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.noarch", "7Server-RH7-RHOSE-3.9:mediawiki123-0:1.23.17-1.el7.src", "7Server-RH7-RHOSE-3.9:mediawiki123-doc-0:1.23.17-1.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "mediawiki: BotPassword can bypass CentralAuth\u0027s account lock" } ] }
cnvd-2019-18905
Vulnerability from cnvd
Title: MediaWiki安全控制绕过漏洞
Description:
MediaWiki是用PHP编写的免费软件开源wiki包,最初用于维基百科,现在也被非营利Wikimedia基金会的若干其他项目和许多其他wikis使用。
MediaWiki存在安全控制绕过漏洞,远程攻击者可利用该漏洞绕过目标系统上的安全控制。
Severity: 中
Patch Name: MediaWiki安全控制绕过漏洞的补丁
Patch Description:
MediaWiki是用PHP编写的免费软件开源wiki包,最初用于维基百科,现在也被非营利Wikimedia基金会的若干其他项目和许多其他wikis使用。
MediaWiki存在安全控制绕过漏洞,远程攻击者可利用该漏洞绕过目标系统上的安全控制。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
厂商已发布了漏洞修复程序,请及时关注更新: https://lists.wikimedia.org/pipermail/mediawiki-announce/2018-September/000223.html
Reference: https://securitytracker.com/id/1041695
Name | ['MediaWiki Mediawiki 1.31', 'MediaWiki Mediawiki 1.30.1', 'MediaWiki Mediawiki 1.29.3', 'MediaWiki Mediawiki 1.27.5'] |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2018-0505" } }, "description": "MediaWiki\u662f\u7528PHP\u7f16\u5199\u7684\u514d\u8d39\u8f6f\u4ef6\u5f00\u6e90wiki\u5305\uff0c\u6700\u521d\u7528\u4e8e\u7ef4\u57fa\u767e\u79d1\uff0c\u73b0\u5728\u4e5f\u88ab\u975e\u8425\u5229Wikimedia\u57fa\u91d1\u4f1a\u7684\u82e5\u5e72\u5176\u4ed6\u9879\u76ee\u548c\u8bb8\u591a\u5176\u4ed6wikis\u4f7f\u7528\u3002\n\nMediaWiki\u5b58\u5728\u5b89\u5168\u63a7\u5236\u7ed5\u8fc7\u6f0f\u6d1e\uff0c\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u7ed5\u8fc7\u76ee\u6807\u7cfb\u7edf\u4e0a\u7684\u5b89\u5168\u63a7\u5236\u3002", "discovererName": "unknown", "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://lists.wikimedia.org/pipermail/mediawiki-announce/2018-September/000223.html", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2019-18905", "openTime": "2019-06-24", "patchDescription": "MediaWiki\u662f\u7528PHP\u7f16\u5199\u7684\u514d\u8d39\u8f6f\u4ef6\u5f00\u6e90wiki\u5305\uff0c\u6700\u521d\u7528\u4e8e\u7ef4\u57fa\u767e\u79d1\uff0c\u73b0\u5728\u4e5f\u88ab\u975e\u8425\u5229Wikimedia\u57fa\u91d1\u4f1a\u7684\u82e5\u5e72\u5176\u4ed6\u9879\u76ee\u548c\u8bb8\u591a\u5176\u4ed6wikis\u4f7f\u7528\u3002\r\n\r\nMediaWiki\u5b58\u5728\u5b89\u5168\u63a7\u5236\u7ed5\u8fc7\u6f0f\u6d1e\uff0c\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u7ed5\u8fc7\u76ee\u6807\u7cfb\u7edf\u4e0a\u7684\u5b89\u5168\u63a7\u5236\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "MediaWiki\u5b89\u5168\u63a7\u5236\u7ed5\u8fc7\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": [ "MediaWiki Mediawiki 1.31", "MediaWiki Mediawiki 1.30.1", "MediaWiki Mediawiki 1.29.3", "MediaWiki Mediawiki 1.27.5" ] }, "referenceLink": "https://securitytracker.com/id/1041695", "serverity": "\u4e2d", "submitTime": "2018-09-21", "title": "MediaWiki\u5b89\u5168\u63a7\u5236\u7ed5\u8fc7\u6f0f\u6d1e" }
ghsa-5c6w-f4w2-2grp
Vulnerability from github
Mediawiki 1.31 before 1.31.1, 1.30.1, 1.29.3 and 1.27.5 contains a flaw where BotPasswords can bypass CentralAuth's account lock
{ "affected": [ { "package": { "ecosystem": "Packagist", "name": "mediawiki/core" }, "ranges": [ { "events": [ { "introduced": "1.27.0" }, { "fixed": "1.27.5" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Packagist", "name": "mediawiki/core" }, "ranges": [ { "events": [ { "introduced": "1.29.0" }, { "fixed": "1.29.3" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Packagist", "name": "mediawiki/core" }, "ranges": [ { "events": [ { "introduced": "1.30.0" }, { "fixed": "1.30.1" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Packagist", "name": "mediawiki/core" }, "ranges": [ { "events": [ { "introduced": "1.31.0" }, { "fixed": "1.31.1" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2018-0505" ], "database_specific": { "cwe_ids": [ "CWE-287" ], "github_reviewed": true, "github_reviewed_at": "2024-05-15T22:53:21Z", "nvd_published_at": "2018-10-04T20:29:00Z", "severity": "MODERATE" }, "details": "Mediawiki 1.31 before 1.31.1, 1.30.1, 1.29.3 and 1.27.5 contains a flaw where BotPasswords can bypass CentralAuth\u0027s account lock", "id": "GHSA-5c6w-f4w2-2grp", "modified": "2024-05-15T22:53:21Z", "published": "2022-05-13T01:31:04Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0505" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:3142" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:3238" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2019:3813" }, { "type": "WEB", "url": "https://github.com/FriendsOfPHP/security-advisories/blob/master/mediawiki/core/CVE-2018-0505.yaml" }, { "type": "PACKAGE", "url": "https://github.com/wikimedia/mediawiki" }, { "type": "WEB", "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2018-September/090849.html" }, { "type": "WEB", "url": "https://phabricator.wikimedia.org/T194605" }, { "type": "WEB", "url": "https://www.debian.org/security/2018/dsa-4301" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1041695" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "type": "CVSS_V3" } ], "summary": "Mediawiki BotPassword can bypass CentralAuth\u0027s account lock" }
fkie_cve-2018-0505
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*", "matchCriteriaId": "FB2A2066-8996-48B5-A5F8-E08443D24B7A", "versionEndExcluding": "1.31.1", "versionStartIncluding": "1.31.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mediawiki:mediawiki:1.27.5:*:*:*:*:*:*:*", "matchCriteriaId": "22E2BE13-CEE0-42ED-BC24-C5ED4EDBAF6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mediawiki:mediawiki:1.29.3:*:*:*:*:*:*:*", "matchCriteriaId": "DD65E2E1-4634-4AE4-9631-4C3352991263", "vulnerable": true }, { "criteria": "cpe:2.3:a:mediawiki:mediawiki:1.30.1:*:*:*:*:*:*:*", "matchCriteriaId": "4F24125C-A1AD-4CED-953F-E2D942AB02FA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Mediawiki 1.31 before 1.31.1, 1.30.1, 1.29.3 and 1.27.5 contains a flaw where BotPasswords can bypass CentralAuth\u0027s account lock" }, { "lang": "es", "value": "Mediawiki en versiones 1.31 anteriores a la 1.31.1, 1.30.1, 1.29.3 y 1.27.5 contiene un fallo en el que BotPasswords puede omitir el bloqueo de cuenta de CentratlAuth." } ], "id": "CVE-2018-0505", "lastModified": "2024-11-21T03:38:22.430", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-10-04T20:29:00.687", "references": [ { "source": "security@debian.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041695" }, { "source": "security@debian.org", "url": "https://access.redhat.com/errata/RHSA-2019:3142" }, { "source": "security@debian.org", "url": "https://access.redhat.com/errata/RHSA-2019:3238" }, { "source": "security@debian.org", "url": "https://access.redhat.com/errata/RHSA-2019:3813" }, { "source": "security@debian.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2018-September/090849.html" }, { "source": "security@debian.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://phabricator.wikimedia.org/T194605" }, { "source": "security@debian.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4301" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041695" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2019:3142" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2019:3238" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://access.redhat.com/errata/RHSA-2019:3813" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2018-September/090849.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://phabricator.wikimedia.org/T194605" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4301" } ], "sourceIdentifier": "security@debian.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
gsd-2018-0505
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2018-0505", "description": "Mediawiki 1.31 before 1.31.1, 1.30.1, 1.29.3 and 1.27.5 contains a flaw where BotPasswords can bypass CentralAuth\u0027s account lock", "id": "GSD-2018-0505", "references": [ "https://www.debian.org/security/2018/dsa-4301", "https://access.redhat.com/errata/RHSA-2019:3813", "https://access.redhat.com/errata/RHSA-2019:3238", "https://access.redhat.com/errata/RHSA-2019:3142", "https://advisories.mageia.org/CVE-2018-0505.html", "https://security.archlinux.org/CVE-2018-0505" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2018-0505" ], "details": "Mediawiki 1.31 before 1.31.1, 1.30.1, 1.29.3 and 1.27.5 contains a flaw where BotPasswords can bypass CentralAuth\u0027s account lock", "id": "GSD-2018-0505", "modified": "2023-12-13T01:22:25.208766Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "DATE_PUBLIC": "2018-09-20T21:18:00.000Z", "ID": "CVE-2018-0505", "STATE": "PUBLIC", "TITLE": "BotPasswords can bypass CentralAuth\u0027s account lock" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "mediawiki", "version": { "version_data": [ { "version_value": "before 1.31.1, 1.30.1, 1.29.3 and 1.27.5" } ] } } ] }, "vendor_name": "mediawiki" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Mediawiki 1.31 before 1.31.1, 1.30.1, 1.29.3 and 1.27.5 contains a flaw where BotPasswords can bypass CentralAuth\u0027s account lock" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Authentication bypass" } ] } ] }, "references": { "reference_data": [ { "name": "[wikitech-l] 20180920 Security release: 1.27.5 / 1.29.3 / 1.30.1 / 1.31.1", "refsource": "MLIST", "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2018-September/090849.html" }, { "name": "https://phabricator.wikimedia.org/T194605", "refsource": "CONFIRM", "url": "https://phabricator.wikimedia.org/T194605" }, { "name": "1041695", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041695" }, { "name": "DSA-4301", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4301" }, { "name": "RHSA-2019:3142", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3142" }, { "name": "RHSA-2019:3238", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3238" }, { "name": "RHSA-2019:3813", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3813" } ] }, "source": { "discovery": "UNKNOWN" } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.31.1", "versionStartIncluding": "1.31.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mediawiki:mediawiki:1.29.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mediawiki:mediawiki:1.27.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mediawiki:mediawiki:1.30.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "ID": "CVE-2018-0505" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Mediawiki 1.31 before 1.31.1, 1.30.1, 1.29.3 and 1.27.5 contains a flaw where BotPasswords can bypass CentralAuth\u0027s account lock" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-287" } ] } ] }, "references": { "reference_data": [ { "name": "https://phabricator.wikimedia.org/T194605", "refsource": "CONFIRM", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://phabricator.wikimedia.org/T194605" }, { "name": "[wikitech-l] 20180920 Security release: 1.27.5 / 1.29.3 / 1.30.1 / 1.31.1", "refsource": "MLIST", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://lists.wikimedia.org/pipermail/wikitech-l/2018-September/090849.html" }, { "name": "DSA-4301", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4301" }, { "name": "1041695", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041695" }, { "name": "RHSA-2019:3142", "refsource": "REDHAT", "tags": [], "url": "https://access.redhat.com/errata/RHSA-2019:3142" }, { "name": "RHSA-2019:3238", "refsource": "REDHAT", "tags": [], "url": "https://access.redhat.com/errata/RHSA-2019:3238" }, { "name": "RHSA-2019:3813", "refsource": "REDHAT", "tags": [], "url": "https://access.redhat.com/errata/RHSA-2019:3813" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6 } }, "lastModifiedDate": "2019-10-18T04:15Z", "publishedDate": "2018-10-04T20:29Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.