Last modified: 2006-05-23 04:16:56 UTC

Wikimedia Bugzilla is closed!

Wikimedia has migrated from Bugzilla to Phabricator. Bug reports should be created and updated in Wikimedia Phabricator instead. Please create an account in Phabricator and add your Bugzilla email address to it.
Wikimedia Bugzilla is read-only. If you try to edit or create any bug report in Bugzilla you will be shown an intentional error message.
In order to access the Phabricator task corresponding to a Bugzilla report, just remove "static-" from its URL.
You could still run searches in Bugzilla or access your list of votes but bug reports will obviously not be up-to-date in Bugzilla.
Bug 6055 - Javascript Security Exploit
Javascript Security Exploit
Status: RESOLVED FIXED
Product: MediaWiki
Classification: Unclassified
General/Unknown (Other open bugs)
unspecified
All Windows XP
: High critical (vote)
: ---
Assigned To: Nobody - You can work on this!
http://en.wikipedia.org/wiki/User:Nic...
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2006-05-23 03:07 UTC by Naconkantari
Modified: 2006-05-23 04:16 UTC (History)
0 users

See Also:
Web browser: ---
Mobile Platform: ---
Assignee Huggle Beta Tester: ---


Attachments

Description Naconkantari 2006-05-23 03:07:17 UTC
(copied from email)
Hi All,

Second MediaWiki 1.6.5 JavaScript Execution Vulnerability in the Parser.

Unlike the previous one, this one affects the live Wikipedia too (i.e.
tidy does not prevent it).

Vuln is here: http://nickj.org/MediaWiki/Parser25
And also on the wikipedia here:
http://en.wikipedia.org/wiki/User:Nickj/JS-vuln-2

And the full list of Parser problems is here: http://nickj.org/MediaWiki
(Anything with yellow or red in the "Security aspects?" column is a
potential or actual JS execution problem, respectively; everything
else is an HTML validation problem).

All the best,
Nick.
Comment 1 Brion Vibber 2006-05-23 04:16:56 UTC
Fixed on trunk in r14349.

Note You need to log in before you can comment on or make changes to this bug.


Navigation
Links