Lucene search

K
cvelistGitHub_MCVELIST:CVE-2024-34701
HistoryMay 13, 2024 - 3:54 p.m.

CVE-2024-34701 CreateWiki vulnerable to impersonation of wiki requester

2024-05-1315:54:12
CWE-863
GitHub_M
www.cve.org
miraheze
mediawiki extension
user impersonation
security fix
rest api
special pages
wiki farm

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

0.0004 Low

EPSS

Percentile

10.2%

CreateWiki is Miraheze’s MediaWiki extension for requesting & creating wikis. It is possible for users to be considered as the requester of a specific wiki request if their local user ID on any wiki in a wiki farm matches the local ID of the requester at the wiki where the wiki request was made. This allows them to go to that request entry’s on Special:RequestWikiQueue on the wiki where their local user ID matches and take any actions that the wiki requester is allowed to take from there.

Commit 02e0f298f8d35155c39aa74193cb7b867432c5b8 fixes the issue. Important note about the fix: This vulnerability has been fixed by disabling access to the REST API and special pages outside of the wiki configured as the “global wiki” in $wgCreateWikiGlobalWiki in a user’s MediaWiki settings.

As a workaround, it is possible to disable the special pages outside of one’s own global wiki by doing something similar to miraheze/mw-config commit e5664995fbb8644f9a80b450b4326194f20f9ddc that is adapted to one’s own setup. As for the REST API, before the fix, there wasn’t any REST endpoint that allowed one to make writes. Regardless, it is possible to also disable it outside of the global wiki by using $wgCreateWikiDisableRESTAPI and $wgConf in the configuration for one’s own wiki farm…

CNA Affected

[
  {
    "vendor": "miraheze",
    "product": "CreateWiki",
    "versions": [
      {
        "version": "< 02e0f298f8d35155c39aa74193cb7b867432c5b8",
        "status": "affected"
      }
    ]
  }
]

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

0.0004 Low

EPSS

Percentile

10.2%

Related for CVELIST:CVE-2024-34701