Last modified: 2005-12-04 11:39:38 UTC

Wikimedia Bugzilla is closed!

Wikimedia has migrated from Bugzilla to Phabricator. Bug reports should be created and updated in Wikimedia Phabricator instead. Please create an account in Phabricator and add your Bugzilla email address to it.
Wikimedia Bugzilla is read-only. If you try to edit or create any bug report in Bugzilla you will be shown an intentional error message.
In order to access the Phabricator task corresponding to a Bugzilla report, just remove "static-" from its URL.
You could still run searches in Bugzilla or access your list of votes but bug reports will obviously not be up-to-date in Bugzilla.
Bug 4165 - XSS: tainted uselang parameter is passed to eval().
XSS: tainted uselang parameter is passed to eval().
Status: RESOLVED FIXED
Product: MediaWiki
Classification: Unclassified
General/Unknown (Other open bugs)
1.6.x
PC All
: Highest critical (vote)
: ---
Assigned To: Nobody - You can work on this!
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2005-12-04 09:51 UTC by brevam
Modified: 2005-12-04 11:39 UTC (History)
0 users

See Also:
Web browser: ---
Mobile Platform: ---
Assignee Huggle Beta Tester: ---


Attachments

Description brevam 2005-12-04 09:51:45 UTC
Not untainted uselang parameter is passed to eval(), in 
setupLangObj function in Setup.php.
This causes server-/client-side serious security problem.

Exaple:
 ?uselang=xx{}echo'test';$langclass='languageJa';class+yy{//
This shows 'test'.
Comment 1 Brion Vibber 2005-12-04 11:39:38 UTC
Fixed on CVS HEAD and REL1_5, in 1.5.3 release. Bug was introduced in May 2005, bad regexp replacing a 
good one.

(Since our bugzilla is public, consider reporting serious security issues by private e-mail. We'll get 
a fix out as fast as we can, but if you posted at a bad time of day it might be sitting in public for 
hours before it's read by us.)

Note You need to log in before you can comment on or make changes to this bug.


Navigation
Links