Vulnerability Name: | CVE-2020-35623 (CCN-193643) | ||||||||||||
Assigned: | 2020-09-21 | ||||||||||||
Published: | 2020-09-21 | ||||||||||||
Updated: | 2021-07-21 | ||||||||||||
Summary: | An issue was discovered in the CasAuth extension for MediaWiki through 1.35.1. Due to improper username validation, it allowed user impersonation with trivial manipulations of certain characters within a given username. An ordinary user may be able to login as a "bureaucrat user" who has a similar username, as demonstrated by usernames that differ only in (1) bidirectional override symbols or (2) blank space. | ||||||||||||
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
| ||||||||||||
Vulnerability Type: | CWE-522 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-35623 Source: XF Type: UNKNOWN mediatek-cve202035623-spoofing(193643) Source: MISC Type: Patch, Third Party Advisory https://github.com/CWRUChielLab/CASAuth/pull/11 Source: CCN Type: Phabricator Web page Logins to MW with at least one SSO client extension allows masquerading as another user (CVE-2020-35623) Source: MISC Type: Exploit, Third Party Advisory https://phabricator.wikimedia.org/T263498 Source: CCN Type: MediaWiki Web site MediaWiki | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||||||
BACK |