MediaWiki < 1.29.1 - Multiple Vulnerabilities

2017.08.27
ae bRpsd (AE) ae
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ .:. Exploit Title > MediaWiki < 1.29.1 - Multiple Vulnerabilities .:. Google Dorks .:. inurl:/index.php/Main_Page inurl:mw-config/index.php "The MediaWiki logo" "Please set up the wiki first" .:. Date: August 27, 2017 .:. Exploit Author: bRpsd .:. Skype contact: vegnox .:. Mail contact: cy@live.no .:. Vendor Homepage > https://www.mediawiki.org/ .:. Software Link > https://releases.wikimedia.org/mediawiki/1.29/mediawiki-1.29.1.tar.gz .:. Version: 1.29.1 latest! .:. Tested on > Linux, on local xampp @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ Vulnerability 1: Weak upgrade key set in the configuration After the first setup of the script, a 16 length key is generated and saved in the configuration as the (upgrade key). It allows the key holder to upgrade the cms to the latest version. the key is about letters and numbers only: abcdefghijklmnopqrstuvwxyz0123456789 which is pretty weak and can be brute forced easily! since there's no recaptcha system or limitation when upgrading! Page Path: http://localhost/mw-config/?page=ExistingWiki Vulnerability 2: Download Database + Configuration any time just like the first. Anyone who accesses the upgrade page with the upgrade key, which can be acquired easily from the previous vulnerability above, can download the entire database and configuration by just settings variable localsettings to 1 : http://localhost/mw-config/?localsettings=1 -Enjoy


Vote for this issue:
0%
100%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top