Vulnerability Details : CVE-2021-29483
ManageWiki is an extension to the MediaWiki project. The 'wikiconfig' API leaked the value of private configuration variables set through the ManageWiki variable to all users. This has been patched by https://github.com/miraheze/ManageWiki/compare/99f3b2c8af18...befb83c66f5b.patch. If you are unable to patch set `$wgAPIListModules['wikiconfig'] = 'ApiQueryDisabled';` or remove private config as a workaround.
Vulnerability category: Information leak
Products affected by CVE-2021-29483
- cpe:2.3:a:miraheze:managewiki:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-29483
0.44%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 60 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-29483
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
NIST | |
9.4
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H |
3.9
|
5.5
|
GitHub, Inc. |
CWE ids for CVE-2021-29483
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: security-advisories@github.com (Primary)
References for CVE-2021-29483
-
https://phabricator.miraheze.org/T7213
⚓ T7213 ManageWiki API allows viewing configs that shouldn't be viewed publiclyIssue Tracking;Third Party Advisory
-
https://github.com/miraheze/ManageWiki/commit/befb83c66f5b643e174897ea41a8a46679b26304
Merge pull request from GHSA-jmc9-rv2f-g8vv · miraheze/ManageWiki@befb83c · GitHubPatch;Third Party Advisory
-
https://github.com/miraheze/ManageWiki/security/advisories/GHSA-jmc9-rv2f-g8vv
'wikiconfig' API leaked private config variables set through ManageWiki · Advisory · miraheze/ManageWiki · GitHubMitigation;Patch;Third Party Advisory
Jump to