Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 192197 - www-apps/mediawiki Cross-Site Scripting Vulnerability (CVE-2007-4828)
Summary: www-apps/mediawiki Cross-Site Scripting Vulnerability (CVE-2007-4828)
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High minor (vote)
Assignee: Gentoo Security
URL: http://secunia.com/advisories/26772/
Whiteboard: B4 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2007-09-11 17:55 UTC by Tobias Heinlein (RETIRED)
Modified: 2007-10-02 21:40 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Tobias Heinlein (RETIRED) gentoo-dev 2007-09-11 17:55:50 UTC
DESCRIPTION:
A vulnerability has been reported in MediaWiki, which can be
exploited by malicious people to conduct cross-site scripting
attacks.

Input passed to unspecified parameters in the API pretty-printing
mode is not properly sanitised before being returned to the user.
This can be exploited to execute arbitrary HTML and script code in a
user's browser session in context of an affected site.

Successful exploitation requires that the API interface is enabled.

The vulnerability is reported in the following versions:
* 1.11 <= 1.11.0rc1
* 1.10 <= 1.10.1
* 1.9 <= 1.9.3
* 1.8 <= 1.8.4 (if $wgEnableAPI has been switched on)

SOLUTION:
Update to version 1.11.0, 1.10.2, 1.9.4, or 1.8.5.
Comment 1 Tobias Heinlein (RETIRED) gentoo-dev 2007-09-11 17:59:43 UTC
Setting whiteboard status and CC'ing maintainers.
Comment 2 Robert Buchholz (RETIRED) gentoo-dev 2007-09-14 10:11:56 UTC
According to the announce mail, versions 1.7 and earlier are also vulnerable if the BotQuery extension is enabled/installed (CVE-2007-4883). Do we ship this extension?
Comment 3 Gunnar Wrobel (RETIRED) gentoo-dev 2007-09-15 14:34:16 UTC
@tchiwam, @trapni: May I bump this to the new versions? I prepared and tested the stuff locally and would be ready to commit.
Comment 4 Philippe Trottier (RETIRED) gentoo-dev 2007-09-17 14:30:55 UTC
Before 1.8 it is only a problem if the extension is turned on. And we do not turn it on by default.

Gunnar Wrobel,  you can commit the version bumps, if they are ready and you have tested them, I think this will be the most effective as I am still on the holiday return work rush.
Comment 5 Christian Parpart (RETIRED) gentoo-dev 2007-09-17 14:35:42 UTC
in case you tested it, feel free :)
Comment 6 Gunnar Wrobel (RETIRED) gentoo-dev 2007-09-17 14:51:08 UTC
thanks, guys! the new versions are in.

target archs for mediawiki-1.8.5:

amd64 ppc sparc x86
Comment 7 Tobias Scherbaum (RETIRED) gentoo-dev 2007-09-17 17:22:07 UTC
ppc stable
Comment 8 Markus Meier gentoo-dev 2007-09-17 21:33:47 UTC
x86 stable
Comment 9 Raúl Porcel (RETIRED) gentoo-dev 2007-09-25 15:50:18 UTC
sparc stable
Comment 10 Wulf Krueger (RETIRED) gentoo-dev 2007-09-29 11:32:42 UTC
Marked stable on amd64.
Comment 11 Robert Buchholz (RETIRED) gentoo-dev 2007-09-29 11:54:16 UTC
B4 -> [glsa?]

Please vote.
Comment 12 Pierre-Yves Rofes (RETIRED) gentoo-dev 2007-09-29 14:28:21 UTC
XSS is sadly way too common :( 
I vote NO.
Comment 13 Gunnar Wrobel (RETIRED) gentoo-dev 2007-09-29 14:48:34 UTC
Removed insecure versions from the tree. Webapps is done here.
Comment 14 Raphael Marichez (Falco) (RETIRED) gentoo-dev 2007-10-02 21:40:46 UTC
webapp + XSS = noglsa. A webapp *has* XSS in it, that's a rule of the known universe, it's like "42".

Feel free to reopen if you disagree :)