Last modified: 2013-03-20 19:19:40 UTC

Wikimedia Bugzilla is closed!

Wikimedia migrated from Bugzilla to Phabricator. Bug reports are handled in Wikimedia Phabricator.
This static website is read-only and for historical purposes. It is not possible to log in and except for displaying bug reports and their history, links might be broken. See T48085, the corresponding Phabricator task for complete and up-to-date bug report information.
Bug 46085 - Cross-site scripting at page editing
Cross-site scripting at page editing
Status: RESOLVED INVALID
Product: MediaWiki
Classification: Unclassified
Page editing (Other open bugs)
unspecified
All All
: Unprioritized normal (vote)
: ---
Assigned To: Chris Steipp
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2013-03-13 20:50 UTC by Rodrigo
Modified: 2013-03-20 19:19 UTC (History)
8 users (show)

See Also:
Web browser: ---
Mobile Platform: ---
Assignee Huggle Beta Tester: ---


Attachments

Description Rodrigo 2013-03-13 20:50:10 UTC
Hello, I'm here to report a security flaw at MediaWiki, this flaw(XSS) is a serious threat to users.

How to reproduce the bug?

I want to edit a section of a MediaWiki page, so I click the Edit link. I'll be redirected to a page like http://es.wikipedia.org/w/index.php?title=Jedi&action=edit&section=28

Now, as the 'section' parameter is vulnerable to XSS, I will add HTML code, for example http://es.wikipedia.org/w/index.php?title=Jedi&action=edit&section=28<h1>hello</h1> and it is shown in the response.


Hope this bug will be solved to grant users' security.
Comment 1 Alex Monk 2013-03-13 20:54:20 UTC
I just get this error:

Cannot find section
You tried to edit a section that does not exist. It may have been moved or deleted while you were viewing the page.
Comment 2 Chris Steipp 2013-03-13 21:09:01 UTC
Hi Rodrigo, thank you for the report!

I see what you mean, that value is treated as wikitext when it's written into the error message.

Fortunately, wikitext is a very strict about security, so there shouldn't be a way to inject any scripts through that vector, any more than you can add it directly into a wiki page. So I don't think this is exploitable.

However, if you do find a way to exploit this, please let me know. That would be a much bigger problem.
Comment 3 Rodrigo 2013-03-13 21:18:45 UTC
Yes, I noticed that there's no way to exploit it, just could inject some HTML code.

Thanks for the quick response!
Comment 4 Alex Monk 2013-03-20 19:19:40 UTC
I've checked with Chris and this is invalid, and I've moved it out of the security area. If you need to reopen please move it back.

Note You need to log in before you can comment on or make changes to this bug.


Navigation
Links