Description Preview
Overview
The AbuseFilter extension for MediaWiki is designed to help administrators combat vandalism and enforce policies by automatically detecting and responding to problematic edits and account creations. This vulnerability (CVE-2021-31552) stems from improper authorization controls (CWE-863) in the extension's rule execution logic. When certain rules are configured to block accounts after creation, the system incorrectly applies blocks only to the IP addresses used during account creation, leaving the newly created accounts unblocked and operational. This undermines the intended security controls and allows potentially malicious accounts to remain active. Furthermore, the vulnerability enables unprivileged users to potentially enumerate and collect IP addresses associated with account creations, creating privacy concerns and providing information that could be used in further attacks.
Remediation
To address this vulnerability, MediaWiki administrators should:
- Update the AbuseFilter extension to the latest version that contains the security fix.
- Review and adjust any AbuseFilter rules that target account creation to ensure they function as intended.
- Audit existing user accounts that may have been created while evading proper blocking mechanisms.
- Consider implementing additional monitoring for suspicious account creation patterns.
- Apply the patch referenced in the Wikimedia Gerrit repository (I8bae477ad7e4d0190335363ac2decf28e4313da1) if unable to update to a fixed version.
References
- Wikimedia Gerrit Repository Patch: https://gerrit.wikimedia.org/r/q/I8bae477ad7e4d0190335363ac2decf28e4313da1
- Wikimedia Phabricator Issue Tracking: https://phabricator.wikimedia.org/T152394
- Common Weakness Enumeration: CWE-863 (Incorrect Authorization)
- MediaWiki AbuseFilter Extension Documentation: https://www.mediawiki.org/wiki/Extension:AbuseFilter
Industry ExposureMost to leastThis section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
- ManufacturingManufacturing
- Professional, Scientific, & Technical ServicesProfessional, Scientific, & Technical Services
- Public AdministrationPublic Administration
- Accommodation & Food ServicesAccommodation & Food Services
- Administrative, Support, Waste Management & Remediation ServicesAdministrative, Support, Waste Management & Remediation Services
- Agriculture, Forestry Fishing & HuntingAgriculture, Forestry Fishing & Hunting
- Arts, Entertainment & RecreationArts, Entertainment & Recreation
- ConstructionConstruction
- Educational ServicesEducational Services
- Finance and InsuranceFinance and Insurance
- Health Care & Social AssistanceHealth Care & Social Assistance
- InformationInformation
- Management of Companies & EnterprisesManagement of Companies & Enterprises
- MiningMining
- Other Services (except Public Administration)Other Services (except Public Administration)
- Real Estate Rental & LeasingReal Estate Rental & Leasing
- Retail TradeRetail Trade
- Transportation & WarehousingTransportation & Warehousing
- UtilitiesUtilities
- Wholesale TradeWholesale Trade