| Summary: | mediawiki new security issue fixed upstream in 1.22.7 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | sysadmin-bugs, tmb, warrendiogenese |
| Version: | 4 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/601574/ | ||
| Whiteboard: | MGA3TOO MGA3-64-OK MGA3-32-OK MGA4-64-OK MGA4-32-OK advisory | ||
| Source RPM: | mediawiki-1.22.6-1.mga4.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2014-06-03 15:53:52 CEST
David Walser
2014-06-03 15:53:58 CEST
Whiteboard:
(none) =>
MGA3TOO Running fine on our production wiki at work (Mageia 4 i586). CVE-2014-3966 assigned: http://openwall.com/lists/oss-security/2014/06/04/15 Advisory: ======================== Updated mediawiki packages fix security vulnerability: XSS vulnerability in MediaWiki before 1.22.7, due to usernames on Special:PasswordReset being parsed as wikitext. The username on Special:PasswordReset can be supplied by anyone and will be parsed with wgRawHtml enabled. Since Special:PasswordReset is whitelisted by default on private wikis, this could potentially lead to an XSS crossing a privilege boundary (CVE-2014-3966). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3966 https://bugzilla.wikimedia.org/show_bug.cgi?id=65501 http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-May/000151.html http://openwall.com/lists/oss-security/2014/06/04/15 updated to mediawiki 1.22.7 on Mageia 3 i586, Mageia 3 x86_64, Mageia 4 i586 and Mageia 4 x86_64.
Before updating, followed these steps:
* added '$wgRawHtml = 1;' to LocalSettings.php
* loaded the Special:PasswordReset page as an anonymous user.
* Entered into the Username field:
<html><script>alert('gotcha');</script></html>
* Clicked on 'Email new password'.
The javascript was executed when the error message was displayed, since it tries to include the username and the alert popped up for each release.
After updating to 1.22.7 on each, no more alerts and the html is safely displayed as the user name in the error message.
Normal functions like file uploads, edit/add pages still work as they should.
------------------------------------------
Update validated.
Thanks.
Advisory:
CVE-2014-3966: See Comment 2.
SRPM: mediawiki-1.22.6-1.mga4.src.rpm
Could sysadmin please push from core/updates_testing to core/updates.
Thank you!
------------------------------------------Keywords:
(none) =>
validated_update advisory added. Update pushed: http://advisories.mageia.org/MGASA-2014-0253.html Status:
NEW =>
RESOLVED
David Walser
2014-06-07 15:53:17 CEST
URL:
(none) =>
http://lwn.net/Vulnerabilities/601574/ |