Vulnerability Details : CVE-2018-0503
Mediawiki 1.31 before 1.31.1, 1.30.1, 1.29.3 and 1.27.5 contains a flaw where contrary to the documentation, $wgRateLimits entry for 'user' overrides that for 'newbie'.
Products affected by CVE-2018-0503
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*
- cpe:2.3:a:mediawiki:mediawiki:1.29.3:*:*:*:*:*:*:*
- cpe:2.3:a:mediawiki:mediawiki:1.27.5:*:*:*:*:*:*:*
- cpe:2.3:a:mediawiki:mediawiki:1.30.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-0503
0.20%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 59 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-0503
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:N/I:P/A:N |
8.0
|
2.9
|
NIST | |
4.3
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N |
2.8
|
1.4
|
NIST |
CWE ids for CVE-2018-0503
-
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-0503
-
https://lists.wikimedia.org/pipermail/wikitech-l/2018-September/090849.html
[Wikitech-l] Security release: 1.27.5 / 1.29.3 / 1.30.1 / 1.31.1Patch;Vendor Advisory
-
https://access.redhat.com/errata/RHSA-2019:3142
RHSA-2019:3142 - Security Advisory - Red Hat Customer Portal
-
http://www.securitytracker.com/id/1041695
MediaWiki Multiple Flaws Let Remote Authenticated Users Bypass Security Restrictions and Obtain Potentially Sensitive Information - SecurityTrackerThird Party Advisory;VDB Entry
-
https://access.redhat.com/errata/RHSA-2019:3238
RHSA-2019:3238 - Security Advisory - Red Hat Customer Portal
-
https://access.redhat.com/errata/RHSA-2019:3813
RHSA-2019:3813 - Security Advisory - Red Hat Customer Portal
-
https://phabricator.wikimedia.org/T169545
⚓ T169545 $wgRateLimits (rate limit / ping limiter) entry for 'user' overrides that for 'newbie' (CVE-2018-0503)Patch;Third Party Advisory
-
https://www.debian.org/security/2018/dsa-4301
Debian -- Security Information -- DSA-4301-1 mediawikiThird Party Advisory
Jump to