Vulnerability Name:

CVE-2021-21275 (CCN-195705)

Assigned:2020-12-22
Published:2021-01-21
Updated:2022-04-26
Summary:The MediaWiki "Report" extension has a Cross-Site Request Forgery (CSRF) vulnerability. Before fixed version, there was no protection against CSRF checks on Special:Report, so requests to report a revision could be forged. The problem has been fixed in commit f828dc6 by making use of MediaWiki edit tokens.
CVSS v3 Severity:4.3 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N)
3.8 Low (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
4.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N)
3.8 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
4.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-352
CWE-352
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2021-21275

Source: XF
Type: UNKNOWN
report-cve202121275-csrf(195705)

Source: MISC
Type: Patch, Third Party Advisory
https://github.com/Kenny2github/Report/commit/f828dc6f73cdfaea5639edbf8ac7b326eeefb117

Source: CCN
Type: GitHub Web site
CSRF vulnerability for reporting revisions

Source: CONFIRM
Type: Patch, Third Party Advisory
https://github.com/Kenny2github/Report/security/advisories/GHSA-9f3w-c334-jm2h

Source: CCN
Type: MediaWiki Web site
Extension:Report

Source: N/A
Type: Third Party Advisory
N/A

Source: CCN
Type: Oracle CPUApr2022
Oracle Critical Patch Update Advisory - April 2022

Source: MISC
Type: Third Party Advisory
https://www.oracle.com/security-alerts/cpuapr2022.html

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2021-21275

Vulnerable Configuration:Configuration 1:
  • cpe:/a:report_project:report:*:*:*:*:*:mediawiki:*:* (Version < 2021-01-21)

  • Configuration 2:
  • cpe:/a:oracle:communications_cloud_native_core_network_slice_selection_function:1.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:communications_pricing_design_center:12.0.0.4.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:communications_pricing_design_center:12.0.0.5.0:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:mediawiki:mediawiki:-:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    report_project report *
    oracle communications cloud native core network slice selection function 1.2.1
    oracle communications pricing design center 12.0.0.4.0
    oracle communications pricing design center 12.0.0.5.0
    mediawiki mediawiki -