Vulnerability Description
The User::randomPassword function in MediaWiki before 1.23.12, 1.24.x before 1.24.5, 1.25.x before 1.25.4, and 1.26.x before 1.26.1 generates passwords smaller than $wgMinimalPasswordLength, which makes it easier for remote attackers to obtain access via a brute-force attack.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mediawiki | Mediawiki | <= 1.23.11 |
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2015/12/21/8Mailing ListPatchThird Party Advisory
- http://www.openwall.com/lists/oss-security/2015/12/23/7Mailing ListPatchThird Party Advisory
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-December/000186.htPatchRelease NotesVendor Advisory
- https://phabricator.wikimedia.org/T115522PatchThird Party Advisory
- http://www.openwall.com/lists/oss-security/2015/12/21/8Mailing ListPatchThird Party Advisory
- http://www.openwall.com/lists/oss-security/2015/12/23/7Mailing ListPatchThird Party Advisory
- https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-December/000186.htPatchRelease NotesVendor Advisory
- https://phabricator.wikimedia.org/T115522PatchThird Party Advisory
FAQ
What is CVE-2015-8626?
CVE-2015-8626 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The User::randomPassword function in MediaWiki before 1.23.12, 1.24.x before 1.24.5, 1.25.x before 1.25.4, and 1.26.x before 1.26.1 generates passwords smaller than $wgMinimalPasswordLength, which mak...
How severe is CVE-2015-8626?
CVE-2015-8626 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2015-8626?
Check the references section above for vendor advisories and patch information. Affected products include: Mediawiki Mediawiki.