Last modified: 2012-04-12 13:54:24 UTC

Wikimedia Bugzilla is closed!

Wikimedia migrated from Bugzilla to Phabricator. Bug reports are handled in Wikimedia Phabricator.
This static website is read-only and for historical purposes. It is not possible to log in and except for displaying bug reports and their history, links might be broken. See T30450, the corresponding Phabricator task for complete and up-to-date bug report information.
Bug 28450 - Backslash-escaped comments allow CSS injection vulnerability
Backslash-escaped comments allow CSS injection vulnerability
Status: RESOLVED FIXED
Product: MediaWiki
Classification: Unclassified
Parser (Other open bugs)
1.16.x
All All
: Normal normal (vote)
: ---
Assigned To: Nobody - You can work on this!
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2011-04-07 04:33 UTC by Tim Starling
Modified: 2012-04-12 13:54 UTC (History)
3 users (show)

See Also:
Web browser: ---
Mobile Platform: ---
Assignee Huggle Beta Tester: ---


Attachments

Description Tim Starling 2011-04-07 04:33:00 UTC
Wikipedia user Suffusion of Yellow discovered a CSS injection vulnerability, which occurs when CSS comments /* ... */ are escaped with backslashes: \2f\2a ... \2a\2f. The bug is due to an error in the CSS escape sequence normalisation code which we introduced to fix bug 23687.

As with any CSS injection vulnerability, the impact is complete account compromise (XSS) for Internet Explorer users, and possible privacy loss due to arbitrary remote image embedding for users of other browsers.
Comment 1 Platonides 2011-04-12 21:34:04 UTC
Was fixed in r85856
Comment 2 Antoine "hashar" Musso (WMF) 2011-10-24 08:40:28 UTC
Basic test added with r100584

Note You need to log in before you can comment on or make changes to this bug.


Navigation
Links