CVE-2024-47816

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-47816
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-47816.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-47816
Aliases
  • GHSA-jjmq-mg36-6387
Published
2024-10-09T18:19:17.108Z
Modified
2025-12-10T10:02:15.845395Z
Severity
  • 6.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L CVSS Calculator
Summary
Users can impersonate import requesters if their actor IDs coincide in ImportDump
Details

ImportDump is a mediawiki extension designed to automate user import requests. A user's local actor ID is stored in the database to tell who made what requests. Therefore, if a user on another wiki happens to have the same actor ID as someone on the central wiki, the user on the other wiki can act as if they're the original wiki requester. This can be abused to create new comments, edit the request, and view the request if it's marked private. This issue has been addressed in commit 5c91dfc and all users are advised to update. Users unable to update may disable the special page outside of their global wiki. See miraheze/mw-config@e566499 for details on that.

Database specific
{
    "cwe_ids": [
        "CWE-282"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/47xxx/CVE-2024-47816.json",
    "cna_assigner": "GitHub_M"
}
References

Affected packages

Git / github.com/miraheze/importdump

Affected ranges

Type
GIT
Repo
https://github.com/miraheze/importdump
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Database specific

source

"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-47816.json"

Git / github.com/miraheze/mw-config

Affected ranges

Type
GIT
Repo
https://github.com/miraheze/mw-config
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Database specific

source

"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-47816.json"