Last modified: 2006-05-23 04:16:56 UTC

Wikimedia Bugzilla is closed!

Wikimedia migrated from Bugzilla to Phabricator. Bug reports are handled in Wikimedia Phabricator.
This static website is read-only and for historical purposes. It is not possible to log in and except for displaying bug reports and their history, links might be broken. See T8055, the corresponding Phabricator task for complete and up-to-date bug report information.
Bug 6055 - Javascript Security Exploit
Javascript Security Exploit
Status: RESOLVED FIXED
Product: MediaWiki
Classification: Unclassified
General/Unknown (Other open bugs)
unspecified
All Windows XP
: High critical (vote)
: ---
Assigned To: Nobody - You can work on this!
http://en.wikipedia.org/wiki/User:Nic...
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2006-05-23 03:07 UTC by Naconkantari
Modified: 2006-05-23 04:16 UTC (History)
0 users

See Also:
Web browser: ---
Mobile Platform: ---
Assignee Huggle Beta Tester: ---


Attachments

Description Naconkantari 2006-05-23 03:07:17 UTC
(copied from email)
Hi All,

Second MediaWiki 1.6.5 JavaScript Execution Vulnerability in the Parser.

Unlike the previous one, this one affects the live Wikipedia too (i.e.
tidy does not prevent it).

Vuln is here: http://nickj.org/MediaWiki/Parser25
And also on the wikipedia here:
http://en.wikipedia.org/wiki/User:Nickj/JS-vuln-2

And the full list of Parser problems is here: http://nickj.org/MediaWiki
(Anything with yellow or red in the "Security aspects?" column is a
potential or actual JS execution problem, respectively; everything
else is an HTML validation problem).

All the best,
Nick.
Comment 1 Brion Vibber 2006-05-23 04:16:56 UTC
Fixed on trunk in r14349.

Note You need to log in before you can comment on or make changes to this bug.


Navigation
Links