|
|
Message-ID: <1848832289.24879971.1346423678094.JavaMail.root@redhat.com>
Date: Fri, 31 Aug 2012 10:34:38 -0400 (EDT)
From: Jan Lieskovsky <jlieskov@...hat.com>
To: oss-security@...ts.openwall.com
Cc: oss-security@...ts.openwall.com,
Mitre CVE assign department <cve-assign@...re.org>
Subject: CVE Request -- MediaWiki 1.19.2 and 1.18.5 multiple security flaws
Hello Kurt, Steve, vendors,
multiple security flaws were corrected in recent (1.19.2,
and 1.18.5) versions of MediaWiki, a wiki engine:
1) Stored XSS via a File::link to a non-existing image
Upstream bug:
[1] https://bugzilla.wikimedia.org/show_bug.cgi?id=39700
Upstream patch against the 1.19 version:
[2] https://bugzilla.wikimedia.org/show_bug.cgi?id=39700#c11
Upstream patch against the 1.18 version:
[3] https://bugzilla.wikimedia.org/show_bug.cgi?id=39700#c12
References:
[4] http://www.gossamer-threads.com/lists/wiki/mediawiki/295767
[5] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330
[6] https://bugzilla.redhat.com/show_bug.cgi?id=853409
2) Multiple DOM-based XSS flaws due improper filtering of uselang parameter
in combination with JS gadgets
Upstream bug:
[7] https://bugzilla.wikimedia.org/show_bug.cgi?id=37587
Relevant upstream patch:
[8] https://gerrit.wikimedia.org/r/#/c/13336/
References:
[9] http://www.gossamer-threads.com/lists/wiki/mediawiki/295767
[10] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330
[11] https://bugzilla.redhat.com/show_bug.cgi?id=853417
3) CSRF tokens, available via API, not protected when X-Frame-Options headers used
Upstream bug:
[12] https://bugzilla.wikimedia.org/show_bug.cgi?id=39180
Relevant upstream patch:
[13] https://gerrit.wikimedia.org/r/#/c/20472/
References:
[14] http://www.gossamer-threads.com/lists/wiki/mediawiki/295767
[15] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330
[16] https://bugzilla.redhat.com/show_bug.cgi?id=853426
4) Did not prevent account creation for IP addresses blocked with GlobalBlocking
Upstream bug:
[17] https://bugzilla.wikimedia.org/show_bug.cgi?id=39824
Upstream patch against the 1.18 version:
[18] https://bugzilla.wikimedia.org/show_bug.cgi?id=39824#c0
References:
[19] http://www.gossamer-threads.com/lists/wiki/mediawiki/295767
[20] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330
[21] https://bugzilla.redhat.com/show_bug.cgi?id=853440
5) Password saved always to the local MediaWiki database and
possibility to use old passwords for non-existing accounts
in the external auth system
Upstream bug:
[22] https://bugzilla.wikimedia.org/show_bug.cgi?id=39184
Upstream patch:
[23] https://bugzilla.wikimedia.org/show_bug.cgi?id=39184#c1
References:
[24] http://www.gossamer-threads.com/lists/wiki/mediawiki/295767
[25] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330
[26] https://bugzilla.redhat.com/show_bug.cgi?id=853442
6) Metadata about blocks, hidden by a user with suppression rights,
was visible to administrators
Upstream bug:
[27] https://bugzilla.wikimedia.org/show_bug.cgi?id=39823
Patch for 1.18 branch:
[28] https://bugzilla.wikimedia.org/show_bug.cgi?id=39823#c1
References:
[29] http://www.gossamer-threads.com/lists/wiki/mediawiki/295767
[30] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686330
[31] No Red Hat bugzilla entry, since this did not affect
MediaWiki versions, as shipped across various Red Hat products.
Could you allocate CVE ids for these?
Thank you && Regards, Jan.
--
Jan iankko Lieskovsky / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.