Discover the CSRF vulnerability in the PushToWatch extension for MediaWiki through version 1.35.1. Learn about the impact, affected systems, exploitation, and mitigation steps.
An issue was discovered in the PushToWatch extension for MediaWiki through 1.35.1. The primary form did not implement an anti-CSRF token and therefore was completely vulnerable to CSRF attacks against onSkinAddFooterLinks in PushToWatch.php.
Understanding CVE-2020-35626
This CVE identifies a vulnerability in the PushToWatch extension for MediaWiki that could be exploited for CSRF attacks.
What is CVE-2020-35626?
The vulnerability in the PushToWatch extension for MediaWiki through version 1.35.1 allows for CSRF attacks due to the absence of an anti-CSRF token in the primary form.
The Impact of CVE-2020-35626
The vulnerability could be exploited by attackers to perform CSRF attacks against onSkinAddFooterLinks in PushToWatch.php, potentially leading to unauthorized actions being performed on behalf of a user.
Technical Details of CVE-2020-35626
This section provides more technical insights into the CVE.
Vulnerability Description
The primary form in the PushToWatch extension for MediaWiki through version 1.35.1 lacks an anti-CSRF token, making it susceptible to CSRF attacks against onSkinAddFooterLinks in PushToWatch.php.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability can be exploited by malicious actors to execute CSRF attacks against the onSkinAddFooterLinks function in PushToWatch.php.
Mitigation and Prevention
Protecting systems from this vulnerability requires immediate actions and long-term security practices.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates