[Pkg-mediawiki-devel] Bug#696179: Codendi and mediawiki-extensions-base: RSS_Reader Javascript injection
Thorsten Glaser
t.glaser at tarent.de
Mon Dec 17 17:13:56 UTC 2012
Dixi quod…
> On Mon, 17 Dec 2012, Jonathan Wiltshire wrote:
> > have you sought out a CVE
> > number?
>
> No, I’ve got no idea how all this CVE stuff works.
>
> Do you volunteer, or one of the Mediawiki guys lurking here?
> Otherwise I’d just open an entry in the MW bugtracker now,
> if extensions are tracked there, that is.
For CVE tracking, here’s a list of vulnerable softwares:
• FusionForge 5.1, 5.2 and trunk, but not 5.0 or below;
commit f7b371af6f7576058971fd248a93dd864d5b1ce1 fix on
Branch_5_1 confirmed to close this hole; will be merged
into 5.2 and trunk later
⇒ Impact: low (<script> filtered)
• Tuleap, tested with version 5.7.99.9, possibly “all”,
and possibly also Codendi (which is where Tuleap and
FusionForge both have this widget from)
⇒ Impact: low (<script> filtered)
• MediaWiki RSS_Reader extension (fix tested, works)
⇒ Impact: high (<script> *not* filtered)
bye,
//mirabilos
--
tarent solutions GmbH
Rochusstraße 2-4, D-53123 Bonn • http://www.tarent.de/
Tel: +49 228 54881-393 • Fax: +49 228 54881-314
HRB 5168 (AG Bonn) • USt-ID (VAT): DE122264941
Geschäftsführer: Boris Esser, Sebastian Mancke
More information about the Pkg-mediawiki-devel
mailing list