Bug 15606 - mediawiki new security issues fixed upstream in 1.23.9
Summary: mediawiki new security issues fixed upstream in 1.23.9
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 4
Hardware: i586 Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL: http://lwn.net/Vulnerabilities/639967/
Whiteboard: has_procedure advisory MGA4-32-OK MGA...
Keywords: validated_update
Depends on:
Blocks:
 
Reported: 2015-04-01 13:39 CEST by David Walser
Modified: 2015-04-10 16:27 CEST (History)
4 users (show)

See Also:
Source RPM: mediawiki-1.23.8-1.mga4.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2015-04-01 13:39:13 CEST
Upstream has announced version 1.23.9 on March 31:
https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html

CVEs have been requested:
http://openwall.com/lists/oss-security/2015/04/01/1

Update checked into Mageia 4 and Cauldron SVN.  Freeze push requested.

Reproducible: 

Steps to Reproduce:
David Walser 2015-04-01 13:39:18 CEST

Whiteboard: (none) => MGA5TOO, MGA4TOO

Comment 1 David Walser 2015-04-01 15:50:42 CEST
Updated packages uploaded for Mageia 4 and Cauldron.

Advisory to come later one CVEs are assigned.  For now, see the upstream announcement.

Testing procedure:
https://wiki.mageia.org/en/QA_procedure:Mediawiki

Updated packages in core/updates_testing:
========================
mediawiki-1.23.9-1.mga4
mediawiki-mysql-1.23.9-1.mga4
mediawiki-pgsql-1.23.9-1.mga4
mediawiki-sqlite-1.23.9-1.mga4

from mediawiki-1.23.9-1.mga4.src.rpm

Version: Cauldron => 4
Assignee: bugsquad => qa-bugs
Whiteboard: MGA5TOO, MGA4TOO => has_procedure

Comment 2 David Walser 2015-04-01 16:25:17 CEST
Working fine on our production wiki at work, Mageia 4 i586.

Whiteboard: has_procedure => has_procedure MGA4-32-OK

Comment 3 William Murphy 2015-04-02 14:17:49 CEST
Test on Mageia 4 x86_64.

Test one PoC out listed here: https://phabricator.wikimedia.org/T85850

Before upgading, successfully uploaded the example svg listed and when viewing it in the browser, the javascript alerts were triggered.

After upgrading, MediaWiki refused to upload the image.

Created a new page, logged in/out a few users. 

Everything works as it should.

------------------------------------------
Update validated.
Thanks.

Advisory: Pending

SRPM: mediawiki-1.23.8-1.mga4.src.rpm

Could sysadmin please push from core/updates_testing to core/updates.

Thank you!
------------------------------------------

Keywords: (none) => validated_update
CC: (none) => sysadmin-bugs, warrendiogenese
Whiteboard: has_procedure MGA4-32-OK => has_procedure MGA4-32-OK MGA4-64-OK

Comment 4 claire robinson 2015-04-03 13:40:19 CEST
Needs an advisory David please.
Comment 5 David Walser 2015-04-04 00:25:34 CEST
Still no CVE assignments yet.

Generic advisory for now, will update if I see CVE assignments.

Advisory:
========================

Updated mediawiki packages fix security vulnerabilities:

This update provides MediaWiki 1.23.9, which fixes several potential security
issues and another bug.  See the upstream announcement for details.

References:
https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html
Comment 6 Oden Eriksson 2015-04-07 10:10:01 CEST
https://www.mediawiki.org/wiki/Release_notes/1.23#Changes_since_1.23.8

CC: (none) => oe

Comment 7 David Walser 2015-04-07 12:23:24 CEST
CVEs have finally been allocated:
http://openwall.com/lists/oss-security/2015/04/07/3

Advisory to come later today.
Comment 8 David Walser 2015-04-07 13:53:52 CEST
Advisory:
========================

Updated mediawiki packages fix security vulnerabilities:

In MediaWiki before 1.23.9, one could circumvent the SVG MIME blacklist for
embedded resources. This allowed an attacker to embed JavaScript in the SVG
(CVE-2015-2931).

In MediaWiki before 1.23.9, the SVG filter to prevent injecting JavaScript
using animate elements was incorrect (CVE-2015-2932).

In MediaWiki before 1.23.9, a stored XSS vulnerability exists due to the way
attributes were expanded in MediaWiki's Html class, in combination with
LanguageConverter substitutions (CVE-2015-2933).

In MediaWiki before 1.23.9, MediaWiki's SVG filtering could be bypassed with
entity encoding under the Zend interpreter. This could be used to inject
JavaScript (CVE-2015-2934).

In MediaWiki before 1.23.9, one could bypass the style filtering for SVG
files to load external resources. This could violate the anonymity of users
viewing the SVG (CVE-2015-2935).

In MediaWiki before 1.23.9, MediaWiki versions using PBKDF2 for password
hashing (not the default for 1.23) are vulnerable to DoS attacks using
extremely long passwords (CVE-2015-2936).

In MediaWiki before 1.23.9, MediaWiki is vulnerable to "Quadratic Blowup"
DoS attacks, under both HHVM and Zend PHP (CVE-2015-2937).

In MediaWiki before 1.23.9, the MediaWiki feature allowing a user to preview
another user's custom JavaScript could be abused for privilege escalation
(CVE-2015-2938).

In MediaWiki before 1.23.9, function names were not sanitized in Lua error
backtraces, which could lead to XSS (CVE-2015-2939).

In MediaWiki before 1.23.9, the CheckUser extension did not prevent CSRF
attacks on the form allowing checkusers to look up sensitive information
about other users. Since the use of CheckUser is logged, the CSRF could be
abused to defame a trusted user or flood the logs with noise (CVE-2015-2940).

The mediawiki package has been updated to version 1.23.9, fixing these issues
and other bugs.

References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2931
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2932
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2933
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2935
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2936
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2940
https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html
http://openwall.com/lists/oss-security/2015/04/07/3
Comment 9 claire robinson 2015-04-07 14:44:42 CEST
Advisory uploaded, thanks.

Whiteboard: has_procedure MGA4-32-OK MGA4-64-OK => has_procedure advisory MGA4-32-OK MGA4-64-OK

Comment 10 Pascal Terjan 2015-04-10 00:33:26 CEST
Fixed advisory which listed 1.23.8

CC: (none) => pterjan

Comment 11 Mageia Robot 2015-04-10 00:45:12 CEST
An update for this issue has been pushed to Mageia Updates repository.

http://advisories.mageia.org/MGASA-2015-0142.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED

David Walser 2015-04-10 16:27:37 CEST

URL: (none) => http://lwn.net/Vulnerabilities/639967/


Note You need to log in before you can comment on or make changes to this bug.