Last modified: 2005-12-04 11:39:38 UTC

Wikimedia Bugzilla is closed!

Wikimedia migrated from Bugzilla to Phabricator. Bug reports are handled in Wikimedia Phabricator.
This static website is read-only and for historical purposes. It is not possible to log in and except for displaying bug reports and their history, links might be broken. See T6165, the corresponding Phabricator task for complete and up-to-date bug report information.
Bug 4165 - XSS: tainted uselang parameter is passed to eval().
XSS: tainted uselang parameter is passed to eval().
Status: RESOLVED FIXED
Product: MediaWiki
Classification: Unclassified
General/Unknown (Other open bugs)
1.6.x
PC All
: Highest critical (vote)
: ---
Assigned To: Nobody - You can work on this!
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2005-12-04 09:51 UTC by brevam
Modified: 2005-12-04 11:39 UTC (History)
0 users

See Also:
Web browser: ---
Mobile Platform: ---
Assignee Huggle Beta Tester: ---


Attachments

Description brevam 2005-12-04 09:51:45 UTC
Not untainted uselang parameter is passed to eval(), in 
setupLangObj function in Setup.php.
This causes server-/client-side serious security problem.

Exaple:
 ?uselang=xx{}echo'test';$langclass='languageJa';class+yy{//
This shows 'test'.
Comment 1 Brion Vibber 2005-12-04 11:39:38 UTC
Fixed on CVS HEAD and REL1_5, in 1.5.3 release. Bug was introduced in May 2005, bad regexp replacing a 
good one.

(Since our bugzilla is public, consider reporting serious security issues by private e-mail. We'll get 
a fix out as fast as we can, but if you posted at a bad time of day it might be sitting in public for 
hours before it's read by us.)

Note You need to log in before you can comment on or make changes to this bug.


Navigation
Links