Giuseppe Iuculano
2009-Jan-18 11:17 UTC
[Secure-testing-team] mediawiki: NMU to fix CVE-2008-5249, CVE-2008-5250, CVE-2008-5252
Hi, the attacked debdiff is for a proposed NMU to fix CVE-2008-5249, CVE-2008-5250, CVE-2008-5252 in lenny. (Backported from mediawiki 1.12.3) mediawiki (1:1.12.0-2lenny2) testing-security; urgency=high * Security update, NMU to fix fix CVE-2008-5249, CVE-2008-5250, CVE-2008-5252 * debian/patches/CVE-2008-5249_CVE-2008-5250_CVE-2008-5252.patch: - Fixed output escaping for reporting of non-MediaWiki exceptions. Potential XSS if an extension throws one of these with user input. - Avoid fatal error in profileinfo.php when not configured. - Fixed CSRF vulnerability in Special:Import. Fixed input validation in transwiki import feature. - Add a .htaccess to deleted images directory for additional protection against exposure of deleted files with known SHA-1 hashes on default installations. - Fixed XSS vulnerability for Internet Explorer clients, via file uploads which are interpreted by IE as HTML. - Fixed XSS vulnerability for clients with SVG scripting, on wikis where SVG uploads are enabled. Firefox 1.5+ is affected. - Avoid streaming uploaded files to the user via index.php. This allows security-conscious users to serve uploaded files via a different domain, and thus client-side scripts executed from that domain cannot access the login cookies. Affects Special:Undelete, img_auth.php and thumb.php. - When streaming files via index.php, use the MIME type detected from the file extension, not from the data. This reduces the XSS attack surface. - Blacklist redirects via Special:Filepath. Such redirects exacerbate any XSS vulnerabilities involving uploads of files containing scripts. Closes: #508869, #508870 -- Giuseppe Iuculano <giuseppe at iuculano.it> Sun, 18 Jan 2009 11:54:02 +0100 Cheers, Giuseppe -------------- next part -------------- A non-text attachment was scrubbed... Name: mediawiki_1.12.0-2lenny2.debdiff.gz Type: application/x-gzip Size: 15052 bytes Desc: not available Url : http://lists.alioth.debian.org/pipermail/secure-testing-team/attachments/20090118/aedb3107/attachment-0001.bin -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 197 bytes Desc: OpenPGP digital signature Url : http://lists.alioth.debian.org/pipermail/secure-testing-team/attachments/20090118/aedb3107/attachment-0001.pgp
Nico Golde
2009-Jan-18 14:24 UTC
[Secure-testing-team] mediawiki: NMU to fix CVE-2008-5249, CVE-2008-5250, CVE-2008-5252
Hi, * Giuseppe Iuculano <giuseppe at iuculano.it> [2009-01-18 13:19]:> the attacked debdiff is for a proposed NMU to fix CVE-2008-5249, CVE-2008-5250, > CVE-2008-5252 in lenny. (Backported from mediawiki 1.12.3)[...] Thanks for the work! I will check the patches during the next week. How much testing did this patch receive so far? I am somehow unhappy get such a huge patch as NMU without maintainer input. Cheers Nico -- Nico Golde - http://www.ngolde.de - nion at jabber.ccc.de - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 197 bytes Desc: not available Url : http://lists.alioth.debian.org/pipermail/secure-testing-team/attachments/20090118/438fd421/attachment.pgp
Giuseppe Iuculano
2009-Jan-18 16:17 UTC
[Secure-testing-team] mediawiki: NMU to fix CVE-2008-5249, CVE-2008-5250, CVE-2008-5252
Nico Golde ha scritto:> Thanks for the work! I will check the patches during the > next week. How much testing did this patch receive so far?I''m testing this version (not in production), and for the moment I didn''t find any evident problems, but sure it requires more testing.> I > am somehow unhappy get such a huge patch as NMU without > maintainer input.I agree wit you, patch is huge but substantially this is the upstream backported security patch[1] to mediawiki 1.12 branch. Maintainer wrote[2] he is too busy and help from contributors is welcome. P.S. CVE-2008-4408: not affected in etch [1]http://svn.wikimedia.org/viewvc/mediawiki?view=rev&revision=44599 [2]http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=508869#21 Cheers, Giuseppe -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 197 bytes Desc: OpenPGP digital signature Url : http://lists.alioth.debian.org/pipermail/secure-testing-team/attachments/20090118/c8c0aca3/attachment.pgp
Romain Beauxis
2009-Jan-18 20:55 UTC
[Secure-testing-team] [Pkg-mediawiki-devel] Bug#508870: mediawiki: NMU to fix CVE-2008-5249, CVE-2008-5250, CVE-2008-5252
Le Sunday 18 January 2009 12:17:01 Giuseppe Iuculano, vous avez ?crit?:> Hi,Hi !> the attacked debdiff is for a proposed NMU to fix CVE-2008-5249, > CVE-2008-5250, CVE-2008-5252 in lenny. (Backported from mediawiki 1.12.3)Many thanks for this patch and your work ! I have build a fixed package and tested it, it works ok. Also, the changes looks clean from the packaging point. However, I won''t comment on the content of the patch, I don''t have enough time for that. I hope someone else can help reviewing it. Romain> mediawiki (1:1.12.0-2lenny2) testing-security; urgency=high > > * Security update, NMU to fix fix CVE-2008-5249, CVE-2008-5250, > CVE-2008-5252 * > debian/patches/CVE-2008-5249_CVE-2008-5250_CVE-2008-5252.patch: - Fixed > output escaping for reporting of non-MediaWiki exceptions. Potential XSS if > an extension throws one of these with user input. - Avoid fatal error in > profileinfo.php when not configured. > - Fixed CSRF vulnerability in Special:Import. Fixed input validation in > transwiki import feature. > - Add a .htaccess to deleted images directory for additional protection > against exposure of deleted files with known SHA-1 hashes on default > installations. > - Fixed XSS vulnerability for Internet Explorer clients, via file > uploads which are interpreted by IE as HTML. > - Fixed XSS vulnerability for clients with SVG scripting, on wikis > where SVG uploads are enabled. Firefox 1.5+ is affected. > - Avoid streaming uploaded files to the user via index.php. This allows > security-conscious users to serve uploaded files via a different > domain, and thus client-side scripts executed from that domain cannot > access the login cookies. Affects Special:Undelete, img_auth.php and > thumb.php. - When streaming files via index.php, use the MIME type detected > from the file extension, not from the data. This reduces the XSS attack > surface. - Blacklist redirects via Special:Filepath. Such redirects > exacerbate any XSS vulnerabilities involving uploads of files containing > scripts. Closes: #508869, #508870 > > -- Giuseppe Iuculano <giuseppe at iuculano.it> Sun, 18 Jan 2009 11:54:02 > +0100 > > > > > Cheers, > Giuseppe
Nico Golde
2009-Jan-24 14:31 UTC
[Secure-testing-team] mediawiki: NMU to fix CVE-2008-5249, CVE-2008-5250, CVE-2008-5252
Hi, * Nico Golde <debian-secure-testing+ml at ngolde.de> [2009-01-18 16:03]:> * Giuseppe Iuculano <giuseppe at iuculano.it> [2009-01-18 13:19]: > > the attacked debdiff is for a proposed NMU to fix CVE-2008-5249, CVE-2008-5250, > > CVE-2008-5252 in lenny. (Backported from mediawiki 1.12.3) > [...] > Thanks for the work! I will check the patches during the > next week. How much testing did this patch receive so far? I > am somehow unhappy get such a huge patch as NMU without > maintainer input.As far as I can judge that the patch looks fine to me. Please upload to testing-security as described on: http://testing-security.debian.net/uploading.html Cheers and thanks for the work! Nico -- Nico Golde - http://www.ngolde.de - nion at jabber.ccc.de - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 197 bytes Desc: not available Url : http://lists.alioth.debian.org/pipermail/secure-testing-team/attachments/20090124/0ac73148/attachment.pgp
Giuseppe Iuculano
2009-Jan-24 14:46 UTC
[Secure-testing-team] mediawiki: NMU to fix CVE-2008-5249, CVE-2008-5250, CVE-2008-5252
Hi Nico, Nico Golde ha scritto:> As far as I can judge that the patch looks fine to me. > Please upload to testing-security as described on: > http://testing-security.debian.net/uploading.htmlSorry but I''m not a DD, only a DM :) , so I can''t upload it. Can you sponsor this upload? Otherwise I can ask to debian-mentors@ mailing list. Cheers, Giuseppe. -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 197 bytes Desc: OpenPGP digital signature Url : http://lists.alioth.debian.org/pipermail/secure-testing-team/attachments/20090124/2a5ba0ec/attachment.pgp