OAuth2 Client Extension up to 0.3 on MediaWiki Parameter cross site request forgery – Digitalmunition

Exploit/Advisories Cybersecurity study of the dark web exposes vulnerability to machine identities -- ScienceDaily

Published on August 19th, 2019 📆 | 7346 Views ⚑


OAuth2 Client Extension up to 0.3 on MediaWiki Parameter cross site request forgery

CVSS Meta Temp ScoreCurrent Exploit Price (≈)

A vulnerability, which was classified as problematic, has been found in OAuth2 Client Extension up to 0.3 on MediaWiki. This issue affects some unknown functionality. The manipulation as part of a Parameter leads to a cross site request forgery vulnerability. Using CWE to declare the problem leads to CWE-352. Impacted is integrity. An attacker might be able force legitimate users to initiate unwanted actions within the web application.

The weakness was presented 08/19/2019 (GitHub Repository). It is possible to read the advisory at github.com. The identification of this vulnerability is CVE-2019-15150 since 08/18/2019. The attack may be initiated remotely. No form of authentication is needed for a successful exploitation. The technical details are unknown and an exploit is not publicly available.

Upgrading to version 0.4 eliminates this vulnerability.


VulDB Meta Base Score: 4.3
VulDB Meta Temp Score: 3.8

VulDB Base Score: 4.3
VulDB Temp Score: 3.8
VulDB Vector: 🔒
VulDB Reliability: 🔍


VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
Class: Cross site request forgery (CWE-352)
Local: No
Remote: Yes

Availability: 🔒
Status: Not defined

Price Prediction: 🔍
Current Price Estimation: 🔒

Threat Intelligenceinfoedit

Threat: 🔍
Adversaries: 🔍
Geopolitics: 🔍
Economy: 🔍
Predictions: 🔍
Remediation: 🔍Recommended: Upgrade
Status: 🔍

0-Day Time: 🔒

Upgrade: OAuth2 Client Extension 0.4

08/18/2019 CVE assigned
08/19/2019 +1 days Advisory disclosed
08/19/2019 +0 days VulDB entry created
08/19/2019 +0 days VulDB last updateAdvisory: github.com
Status: Unconfirmed

CVE: CVE-2019-15150 (🔒)

Created: 08/19/2019 08:32 AM
Complete: 🔍


No comments yet. Please log in to comment.

See the underground prices here!


Tagged with:

Leave a Reply