XSS vulnerability in profileinfo.php

Bug #610819 reported by Jonathan Wiltshire
258
This bug affects 1 person
Affects Status Importance Assigned to Milestone
MediaWiki
Fix Released
High
mediawiki (Debian)
Fix Released
Unknown
mediawiki (Ubuntu)
Fix Released
Medium
Jonathan Wiltshire
Nominated for Dapper by Jonathan Wiltshire
Nominated for Hardy by Jonathan Wiltshire
Nominated for Jaunty by Jonathan Wiltshire
Nominated for Karmic by Jonathan Wiltshire
Nominated for Lucid by Jonathan Wiltshire
Nominated for Maverick by Jonathan Wiltshire

Bug Description

Binary package hint: mediawiki

From http://lists.wikimedia.org/pipermail/mediawiki-announce/2010-July/000092.html:

A cross-site scripting (XSS) vulnerability was discovered in
profileinfo.php. The vulnerability is only exposed when the script is
explicitly enabled in LocalSettings.php, with $wgEnableProfileInfo = true.

Revision history for this message
In , Tim Starling (tstarling) wrote :

The API (api.php) in previous versions of MediaWiki sends private cache headers by default for almost all API operations, but allows public cache headers to be sent if they are requested via URL or POST data parameters. We have discovered that this policy allows leakage of private data, if an attacker can access the wiki through the same caching HTTP proxy as the victim user.

A user's browser can be tricked into requesting private data with public caching headers, via a CSRF-style attack on an external web page. The attacker would cause the victim's browser to request private data with public caching headers, then the attacker would download the same data from the intermediate HTTP proxy, bypassing access controls.

The kinds of things that may be leaked by this bug are:

* Article titles and contents (if these are restricted)
* The contents of deleted articles
* User email addresses
* User watchlists

The following types of data are not affected and cannot be leaked by this bug:

* User passwords
* Session IDs
* The contents of uploaded files

The main mitigating factor is the need for an HTTP proxy to be shared between the victim and the attacker. However, we believe that some hosting providers use caching HTTP proxies to improve performance, without informing their users that they are doing so. Thus we advise all MediaWiki users to upgrade, unless they control both the server and the network path to the wiki's users, and are convinced that there are no HTTP proxies on that network path.

Our fix will be included in MediaWiki 1.15.5 and 1.16.0. The following versions are affected:

* All versions from MediaWiki 1.8 to 1.14. Note that in MediaWiki 1.8, the API was disabled by default, this would mitigate the attack.
* MediaWiki 1.15.0 to 1.15.4.
* All beta versions in the MediaWiki 1.16 series.

Our fix is comprehensive: it disables public caching for all API modules except those which explicitly declare their data to be public. On private wikis, all responses will be marked private.

Changed in mediawiki (Ubuntu):
importance: Undecided → Medium
assignee: nobody → Jonathan Wiltshire (debian-jwiltshire)
visibility: private → public
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package mediawiki - 1:1.15.5-1

---------------
mediawiki (1:1.15.5-1) unstable; urgency=high

  [ Thorsten Glaser ]
  * debian/patches/suppress_warnings.patch: new, suppress warnings
    about session_start() being called twice also in the PHP error
    log, not just MediaWiki’s, for example run from FusionForge

  [ Jonathan Wiltshire ]
  * New upstream security release:
    - correctly set caching headers to prevent private data leakage
         (closes: #590660, LP: #610782)
    - fix XSS vulnerability in profileinfo.php
         (closes: #590669, LP: #610819)
 -- Jonathan Wiltshire <email address hidden> Wed, 28 Jul 2010 12:23:04 +0100

Changed in mediawiki (Ubuntu):
status: New → Fix Released
Changed in mediawiki (Debian):
status: Unknown → Fix Released
Changed in mediawiki:
importance: Unknown → High
status: Unknown → Fix Released
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.