Bug 14866 - mediawiki new security issues fixed upstream in 1.23.8
Summary: mediawiki new security issues fixed upstream in 1.23.8
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 4
Hardware: i586 Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL: http://lwn.net/Vulnerabilities/627588/
Whiteboard: has_procedure advisory MGA4-64-OK MG...
Keywords: validated_update
Depends on:
Blocks:
 
Reported: 2014-12-21 14:38 CET by David Walser
Modified: 2015-01-08 18:13 CET (History)
2 users (show)

See Also:
Source RPM: mediawiki-1.23.7-1.mga4.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2014-12-21 14:38:18 CET
Upstream has announced version 1.23.8 on December 17:
https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-December/000173.html

CVE request:
http://www.openwall.com/lists/oss-security/2014/12/21/2

Freeze push requested for Cauldron.

Updated package uploaded for Mageia 4.

Advisory to come later once CVEs are assigned.

Updated packages in core/updates_testing:
========================
mediawiki-1.23.8-1.mga4
mediawiki-mysql-1.23.8-1.mga4
mediawiki-pgsql-1.23.8-1.mga4
mediawiki-sqlite-1.23.8-1.mga4

from mediawiki-1.23.8-1.mga4.src.rpm

Reproducible: 

Steps to Reproduce:
Comment 1 David Walser 2014-12-21 14:38:35 CET
Testing procedure:
https://wiki.mageia.org/en/QA_procedure:Mediawiki

Whiteboard: (none) => has_procedure

Comment 2 Herman Viaene 2014-12-23 15:13:03 CET
MGA4-64 on HP Probook 6555b
Followed procedure as in Comment 1 (I did not create a wiki with the old packages)
and did create a new wiki, edited the starting page end added a second page.

CC: (none) => herman.viaene
Whiteboard: has_procedure => has_procedure MGA4-64-OK

Comment 3 Herman Viaene 2014-12-23 15:15:16 CET
I used the Postgres backend.
Comment 4 Herman Viaene 2014-12-23 15:24:18 CET
MGA4-32 on Acer D620
Followed procedure as in Comment 1 (I did not create a wiki with the old packages), used Postgres as backend.
I created a new wiki, edited the starting page end added a second page.

Whiteboard: has_procedure MGA4-64-OK => has_procedure MGA4-64-OK MGA-32-OK

claire robinson 2014-12-24 11:24:17 CET

Whiteboard: has_procedure MGA4-64-OK MGA-32-OK => has_procedure MGA4-64-OK MGA4-32-OK

Comment 5 claire robinson 2014-12-24 11:25:36 CET
Need an advisory for this one please David.
Comment 6 David Walser 2014-12-24 18:43:38 CET
Still no CVE assignments.  Debian has issued an advisory for the first of the two issues on December 23:
https://www.debian.org/security/2014/dsa-3110

Advisory:
========================

Updated mediawiki packages fix security vulnerabilities:

In MediaWiki before 1.23.8, thumb.php outputs wikitext message as raw HTML,
which could lead to cross-site scripting. Permission to edit MediaWiki
namespace is required to exploit this.

In MediaWiki before 1.23.8, a malicious site can bypass CORS restrictions in
$wgCrossSiteAJAXdomains in API calls if it only included an allowed domain as
part of its name.

References:
https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-December/000173.html

URL: (none) => http://lwn.net/Vulnerabilities/627588/

Comment 7 claire robinson 2014-12-26 10:59:03 CET
Validating. Advisory uploaded.

Please push to updates

Thanks

Keywords: (none) => validated_update
Whiteboard: has_procedure MGA4-64-OK MGA4-32-OK => has_procedure advisory MGA4-64-OK MGA4-32-OK
CC: (none) => sysadmin-bugs

Comment 8 Mageia Robot 2014-12-26 18:06:08 CET
An update for this issue has been pushed to Mageia Updates repository.

http://advisories.mageia.org/MGASA-2014-0555.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED

Comment 9 David Walser 2015-01-06 00:00:28 CET
MITRE has finally assigned CVEs:
http://openwall.com/lists/oss-security/2015/01/03/13

Could someone update the advisory in SVN?  Thanks.

Advisory:
========================

Updated mediawiki packages fix security vulnerabilities:

In MediaWiki before 1.23.8, thumb.php outputs wikitext message as raw HTML,
which could lead to cross-site scripting. Permission to edit MediaWiki
namespace is required to exploit this (CVE-2014-9475).

In MediaWiki before 1.23.8, a malicious site can bypass CORS restrictions in
$wgCrossSiteAJAXdomains in API calls if it only included an allowed domain as
part of its name (CVE-2014-9476).

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9475
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9476
https://lists.wikimedia.org/pipermail/mediawiki-announce/2014-December/000173.html
http://openwall.com/lists/oss-security/2015/01/03/13
Comment 10 David Walser 2015-01-08 18:13:58 CET
LWN reference containing both issues:
http://lwn.net/Vulnerabilities/628835/

Note You need to log in before you can comment on or make changes to this bug.