[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Page MenuHomePhabricator

Vuln-XSSTag
ActivePublic

Members (1)

Watchers (4)

Details

Description

This tag is used to group security bugs by their general classification. These bugs allow an attacker to run JavaScript in another user's browser (Cross-site Scripting / XSS). See OWASP Top 10 2017 - A7

Parent project: Security-Team

Recent Activity

Today

CraigKahle added a comment to T356971: Rename help key to help-raw in HTMLForm and deprecate old key name.

Thanks for taking a look. Looking at CheckMatrixWidget.php , it looks to be using OOUI ? If that isn't the case I can add to my feature branch. Which extensions should be updated? I am happy to take that on if it is in scope for this ticket.

Wed, Dec 4, 2:22 AM · Patch-For-Review, MW-1.43-notes (1.43.0-wmf.18; 2024-08-13), SecTeam-Processed, MediaWiki-HTMLForm, Vuln-XSS, Security

Yesterday

Tgr added a comment to T356971: Rename help key to help-raw in HTMLForm and deprecate old key name.

Also:

and a couple more things in extensions.

Tue, Dec 3, 10:20 PM · Patch-For-Review, MW-1.43-notes (1.43.0-wmf.18; 2024-08-13), SecTeam-Processed, MediaWiki-HTMLForm, Vuln-XSS, Security
CraigKahle added a comment to T356971: Rename help key to help-raw in HTMLForm and deprecate old key name.

Thanks Gergő. Understood; I would agree with that. After tracing through each result from the regex you provided (thanks), I am only seeing two direct uses of HTMLForm:

Tue, Dec 3, 6:28 AM · Patch-For-Review, MW-1.43-notes (1.43.0-wmf.18; 2024-08-13), SecTeam-Processed, MediaWiki-HTMLForm, Vuln-XSS, Security
gerritbot added a comment to T356971: Rename help key to help-raw in HTMLForm and deprecate old key name.

Change #1100006 had a related patch set uploaded (by CraigKahle; author: CraigKahle):

[mediawiki/core@master] updating form descriptors to use new 'help-raw' key over 'help' to indicate that it is a raw field.

https://gerrit.wikimedia.org/r/1100006

Tue, Dec 3, 6:17 AM · Patch-For-Review, MW-1.43-notes (1.43.0-wmf.18; 2024-08-13), SecTeam-Processed, MediaWiki-HTMLForm, Vuln-XSS, Security

Mon, Dec 2

sbassett removed a project from T356971: Rename help key to help-raw in HTMLForm and deprecate old key name: good first task.
Mon, Dec 2, 4:52 PM · Patch-For-Review, MW-1.43-notes (1.43.0-wmf.18; 2024-08-13), SecTeam-Processed, MediaWiki-HTMLForm, Vuln-XSS, Security

Sat, Nov 30

Tgr added a comment to T356971: Rename help key to help-raw in HTMLForm and deprecate old key name.

You should feel free to work on it, I just feel that tag sets wrong expectations. We usually use it for small self-contained changes. Deprecations across the whole codebase aren't really that.

Sat, Nov 30, 11:28 PM · Patch-For-Review, MW-1.43-notes (1.43.0-wmf.18; 2024-08-13), SecTeam-Processed, MediaWiki-HTMLForm, Vuln-XSS, Security
CraigKahle added a comment to T356971: Rename help key to help-raw in HTMLForm and deprecate old key name.

Gergő - I really appreciate the detailed response and advice. With that information, I'm going to give it another shot.

Sat, Nov 30, 8:05 PM · Patch-For-Review, MW-1.43-notes (1.43.0-wmf.18; 2024-08-13), SecTeam-Processed, MediaWiki-HTMLForm, Vuln-XSS, Security
Tgr added a comment to T356971: Rename help key to help-raw in HTMLForm and deprecate old key name.

Tagging a parameter migration in one of the most used MediaWiki classes as good first task is a bit ambitious IMO. There are ~50 hits for ('help'|"help")\s+=> in Wikimedia production; someone unfamiliar with the codebase would have to trace every one of those through the call chain until they reach HTMLForm or something that's clearly not using HTMLForm.

Sat, Nov 30, 10:37 AM · Patch-For-Review, MW-1.43-notes (1.43.0-wmf.18; 2024-08-13), SecTeam-Processed, MediaWiki-HTMLForm, Vuln-XSS, Security
Tgr added a comment to T356971: Rename help key to help-raw in HTMLForm and deprecate old key name.

The way I'm searching for deprecated usage is: 'help' => wfMessage; if I'm missing something, please let me know.

Sat, Nov 30, 10:30 AM · Patch-For-Review, MW-1.43-notes (1.43.0-wmf.18; 2024-08-13), SecTeam-Processed, MediaWiki-HTMLForm, Vuln-XSS, Security
CraigKahle added a comment to T356971: Rename help key to help-raw in HTMLForm and deprecate old key name.

I added a topic branch to get started on this. Before I continue I wanted to ensure I'm on the right path. I am a new contributor and have a couple of questions:

Sat, Nov 30, 2:02 AM · Patch-For-Review, MW-1.43-notes (1.43.0-wmf.18; 2024-08-13), SecTeam-Processed, MediaWiki-HTMLForm, Vuln-XSS, Security
gerritbot added a project to T356971: Rename help key to help-raw in HTMLForm and deprecate old key name: Patch-For-Review.
Sat, Nov 30, 1:39 AM · Patch-For-Review, MW-1.43-notes (1.43.0-wmf.18; 2024-08-13), SecTeam-Processed, MediaWiki-HTMLForm, Vuln-XSS, Security
gerritbot added a comment to T356971: Rename help key to help-raw in HTMLForm and deprecate old key name.

Change #1099259 had a related patch set uploaded (by CraigKahle; author: CraigKahle):

[mediawiki/core@master] updating form descriptors to use new 'help-raw' key over 'help' to indicate that it is a raw field.

https://gerrit.wikimedia.org/r/1099259

Sat, Nov 30, 1:39 AM · Patch-For-Review, MW-1.43-notes (1.43.0-wmf.18; 2024-08-13), SecTeam-Processed, MediaWiki-HTMLForm, Vuln-XSS, Security

Fri, Nov 29

CraigKahle added a comment to T356971: Rename help key to help-raw in HTMLForm and deprecate old key name.

I could take this on. The way I'm searching for deprecated usage is: 'help' => wfMessage; if I'm missing something, please let me know. Cheers and happy Thanksgiving for those who celebrate.

Fri, Nov 29, 3:44 AM · Patch-For-Review, MW-1.43-notes (1.43.0-wmf.18; 2024-08-13), SecTeam-Processed, MediaWiki-HTMLForm, Vuln-XSS, Security

Mon, Nov 18

matmarex added a comment to T379677: FancyCaptcha uses unescaped i18n messages.

Thanks!

Mon, Nov 18, 5:13 PM · SecTeam-Processed, Vuln-XSS, MediaWiki-Platform-Team, ConfirmEdit (CAPTCHA extension), Security, Security-Team
sbassett moved T379677: FancyCaptcha uses unescaped i18n messages from Incoming to Our Part Is Done on the Security-Team board.
Mon, Nov 18, 4:44 PM · SecTeam-Processed, Vuln-XSS, MediaWiki-Platform-Team, ConfirmEdit (CAPTCHA extension), Security, Security-Team
sbassett closed T379677: FancyCaptcha uses unescaped i18n messages as Resolved.
Mon, Nov 18, 4:40 PM · SecTeam-Processed, Vuln-XSS, MediaWiki-Platform-Team, ConfirmEdit (CAPTCHA extension), Security, Security-Team
sbassett updated subscribers of T379677: FancyCaptcha uses unescaped i18n messages.

Resolved now, right? Or are you waiting for the MW release to close this?

Mon, Nov 18, 4:40 PM · SecTeam-Processed, Vuln-XSS, MediaWiki-Platform-Team, ConfirmEdit (CAPTCHA extension), Security, Security-Team
matmarex added a comment to T379677: FancyCaptcha uses unescaped i18n messages.

Resolved now, right? Or are you waiting for the MW release to close this?

Mon, Nov 18, 4:28 PM · SecTeam-Processed, Vuln-XSS, MediaWiki-Platform-Team, ConfirmEdit (CAPTCHA extension), Security, Security-Team

Thu, Nov 14

Jdforrester-WMF added a project to T377222: Don’t use raw HTML messages in safe mode: MW-1.44-notes (1.44.0-wmf.4; 2024-11-19).
Thu, Nov 14, 3:01 PM · MW-1.44-notes (1.44.0-wmf.4; 2024-11-19), SecTeam-Processed, Vuln-XSS, Vuln-Misconfiguration, I18n, MediaWiki-Internationalization, Security, Security-Team
gerritbot added a comment to T377222: Don’t use raw HTML messages in safe mode.

Change #1090551 merged by jenkins-bot:

[mediawiki/extensions/WikibaseMediaInfo@master] Avoid unnecessary use of RawHtmlMessages

https://gerrit.wikimedia.org/r/1090551

Thu, Nov 14, 2:46 PM · MW-1.44-notes (1.44.0-wmf.4; 2024-11-19), SecTeam-Processed, Vuln-XSS, Vuln-Misconfiguration, I18n, MediaWiki-Internationalization, Security, Security-Team

Wed, Nov 13

sbassett added a parent task for T379677: FancyCaptcha uses unescaped i18n messages: Restricted Task.
Wed, Nov 13, 3:26 PM · SecTeam-Processed, Vuln-XSS, MediaWiki-Platform-Team, ConfirmEdit (CAPTCHA extension), Security, Security-Team
Tgr added a comment to T379677: FancyCaptcha uses unescaped i18n messages.

Pushed as https://gerrit.wikimedia.org/r/c/mediawiki/extensions/ConfirmEdit/+/1090816

Wed, Nov 13, 10:48 AM · SecTeam-Processed, Vuln-XSS, MediaWiki-Platform-Team, ConfirmEdit (CAPTCHA extension), Security, Security-Team

Tue, Nov 12

sbassett updated subscribers of T379677: FancyCaptcha uses unescaped i18n messages.

Tue, Nov 12, 10:11 PM · SecTeam-Processed, Vuln-XSS, MediaWiki-Platform-Team, ConfirmEdit (CAPTCHA extension), Security, Security-Team
gerritbot added a comment to T377222: Don’t use raw HTML messages in safe mode.

Change #1090551 had a related patch set uploaded (by Gergő Tisza; author: Gergő Tisza):

[mediawiki/extensions/WikibaseMediaInfo@master] Avoid unnecessary use of RawHtmlMessages

https://gerrit.wikimedia.org/r/1090551

Tue, Nov 12, 9:47 PM · MW-1.44-notes (1.44.0-wmf.4; 2024-11-19), SecTeam-Processed, Vuln-XSS, Vuln-Misconfiguration, I18n, MediaWiki-Internationalization, Security, Security-Team
Tgr added a project to T379677: FancyCaptcha uses unescaped i18n messages: Vuln-XSS.
Tue, Nov 12, 9:07 PM · SecTeam-Processed, Vuln-XSS, MediaWiki-Platform-Team, ConfirmEdit (CAPTCHA extension), Security, Security-Team

Nov 1 2024

gerritbot added a comment to T377222: Don’t use raw HTML messages in safe mode.

Change #1085432 merged by jenkins-bot:

[mediawiki/extensions/StopForumSpam@master] Remove stopforumspam-is-blocked message from RawHtmlMessages array

https://gerrit.wikimedia.org/r/1085432

Nov 1 2024, 3:24 PM · MW-1.44-notes (1.44.0-wmf.4; 2024-11-19), SecTeam-Processed, Vuln-XSS, Vuln-Misconfiguration, I18n, MediaWiki-Internationalization, Security, Security-Team

Oct 31 2024

gerritbot added a comment to T377222: Don’t use raw HTML messages in safe mode.

Change #1085432 had a related patch set uploaded (by SBassett; author: SBassett):

[mediawiki/extensions/StopForumSpam@master] Remove stopforumspam-is-blocked message from RawHtmlMessages array

https://gerrit.wikimedia.org/r/1085432

Oct 31 2024, 4:35 PM · MW-1.44-notes (1.44.0-wmf.4; 2024-11-19), SecTeam-Processed, Vuln-XSS, Vuln-Misconfiguration, I18n, MediaWiki-Internationalization, Security, Security-Team
sbassett added a comment to T377222: Don’t use raw HTML messages in safe mode.

It still has <strong> tags and is parsed due to the wikitext links. I guess one could argue that the <strong> tags are superfluous.

But it's parsed so it's safe HTML, not raw HTML.

Oct 31 2024, 4:32 PM · MW-1.44-notes (1.44.0-wmf.4; 2024-11-19), SecTeam-Processed, Vuln-XSS, Vuln-Misconfiguration, I18n, MediaWiki-Internationalization, Security, Security-Team
mmartorana changed the visibility for T377222: Don’t use raw HTML messages in safe mode.
Oct 31 2024, 3:12 PM · MW-1.44-notes (1.44.0-wmf.4; 2024-11-19), SecTeam-Processed, Vuln-XSS, Vuln-Misconfiguration, I18n, MediaWiki-Internationalization, Security, Security-Team

Oct 30 2024

Tgr added a comment to T377222: Don’t use raw HTML messages in safe mode.

It still has <strong> tags and is parsed due to the wikitext links. I guess one could argue that the <strong> tags are superfluous.

Oct 30 2024, 9:33 PM · MW-1.44-notes (1.44.0-wmf.4; 2024-11-19), SecTeam-Processed, Vuln-XSS, Vuln-Misconfiguration, I18n, MediaWiki-Internationalization, Security, Security-Team
sbassett added a comment to T377222: Don’t use raw HTML messages in safe mode.
  • stopforumspam-is-blocked (20bb7d1d - seems wrong? the message is not actually HTML)
Oct 30 2024, 9:13 PM · MW-1.44-notes (1.44.0-wmf.4; 2024-11-19), SecTeam-Processed, Vuln-XSS, Vuln-Misconfiguration, I18n, MediaWiki-Internationalization, Security, Security-Team
Bawolff added a comment to T377222: Don’t use raw HTML messages in safe mode.

The copyright footer is not shown on Special:UserLogin, nor (as far as I can tell) on any other page that has JS disabled;

Oct 30 2024, 8:32 PM · MW-1.44-notes (1.44.0-wmf.4; 2024-11-19), SecTeam-Processed, Vuln-XSS, Vuln-Misconfiguration, I18n, MediaWiki-Internationalization, Security, Security-Team
Tgr added a comment to T377222: Don’t use raw HTML messages in safe mode.

Raw HTML messages not listed in T377222#10241289 but found by codesearch:

  • stopforumspam-is-blocked (20bb7d1d - seems wrong? the message is not actually HTML)
  • donate_interface-otherways (it's a Wikimedia-specific extension, only used on a very locked down wiki, so probably fine? still, seems easy to replace)
  • wikibasemediainfo-time-timestamp-formatted (96e5a07e - no good reason for it to use raw HTML)
Oct 30 2024, 7:59 PM · MW-1.44-notes (1.44.0-wmf.4; 2024-11-19), SecTeam-Processed, Vuln-XSS, Vuln-Misconfiguration, I18n, MediaWiki-Internationalization, Security, Security-Team
Tgr added a comment to T377222: Don’t use raw HTML messages in safe mode.

HTML in copyright messages is a legacy feature at this point. I don't think it makes sense to expend any effort on sanitizing it when security-conscious installations can just disable it.
(We should probably make it default to disabled in the next release, though.)

Oct 30 2024, 6:44 PM · MW-1.44-notes (1.44.0-wmf.4; 2024-11-19), SecTeam-Processed, Vuln-XSS, Vuln-Misconfiguration, I18n, MediaWiki-Internationalization, Security, Security-Team
Lucas_Werkmeister_WMDE added a comment to T377222: Don’t use raw HTML messages in safe mode.

A related thought I had today: do we disable raw HTML messages on Special:UserLogin and related pages? Because not loading user or site scripts on those special pages is a security feature, I believe (we don’t want to let interface admins steal user’s passwords).

Oct 30 2024, 5:28 PM · MW-1.44-notes (1.44.0-wmf.4; 2024-11-19), SecTeam-Processed, Vuln-XSS, Vuln-Misconfiguration, I18n, MediaWiki-Internationalization, Security, Security-Team

Oct 29 2024

Tgr added a comment to T377222: Don’t use raw HTML messages in safe mode.

In theory since T45646: "MediaWiki:Copyright" message allows raw HTML we haven't been using most of these messages in Wikimedia production. $wgAllowRawHtmlCopyrightMessages (already false) should disable all the copyright-related ones (in favor of wikimedia-copyright-footer etc) except the MobileFrontend one which is not raw HTML anymore (fe15e9c776). googlesearch is unreachable. gadgets-definition is irrelevant. That leaves the various non-copyright mobile-frontend-* messages. Probably we can just fix those?

Oct 29 2024, 7:25 PM · MW-1.44-notes (1.44.0-wmf.4; 2024-11-19), SecTeam-Processed, Vuln-XSS, Vuln-Misconfiguration, I18n, MediaWiki-Internationalization, Security, Security-Team

Oct 26 2024

Tgr added a parent task for T45646: "MediaWiki:Copyright" message allows raw HTML: T367995: Security Preview for shared login domain.
Oct 26 2024, 7:11 PM · MW-1.43-notes (1.43.0-wmf.26; 2024-10-08), Patch-For-Review, JsonConfig, WikimediaMessages, MediaWiki-Platform-Team, SUL3, I18n, Security, MW-1.32-notes (WMF-deploy-2018-08-28 (1.32.0-wmf.19)), Vuln-XSS, MediaWiki-General

Oct 22 2024

sbassett added a comment to T377168: XSS - codesearch.wmcloud.org.

Hall of fame update deployed: codfw, eqiad.

Oct 22 2024, 3:41 PM · Patch-For-Review, SecTeam-Processed, cloud-services-team, VPS-project-Codesearch, Vuln-XSS, Security, Security-Team
gerritbot added a comment to T377168: XSS - codesearch.wmcloud.org.

Change #1082089 merged by Mmartorana:

[operations/deployment-charts@master] Update miscweb: security-landing-page to latest image tag

https://gerrit.wikimedia.org/r/1082089

Oct 22 2024, 3:26 PM · Patch-For-Review, SecTeam-Processed, cloud-services-team, VPS-project-Codesearch, Vuln-XSS, Security, Security-Team
Lucas_Werkmeister_WMDE added a comment to T377222: Don’t use raw HTML messages in safe mode.

Sure, fine by me.

Oct 22 2024, 8:18 AM · MW-1.44-notes (1.44.0-wmf.4; 2024-11-19), SecTeam-Processed, Vuln-XSS, Vuln-Misconfiguration, I18n, MediaWiki-Internationalization, Security, Security-Team

Oct 21 2024

gerritbot added a comment to T377168: XSS - codesearch.wmcloud.org.

Change #1082089 had a related patch set uploaded (by SBassett; author: SBassett):

[operations/deployment-charts@master] Update miscweb: security-landing-page to latest image tag

https://gerrit.wikimedia.org/r/1082089

Oct 21 2024, 9:08 PM · Patch-For-Review, SecTeam-Processed, cloud-services-team, VPS-project-Codesearch, Vuln-XSS, Security, Security-Team
sbassett added a comment to T377222: Don’t use raw HTML messages in safe mode.

Also this seems more like a feature request than a security issue. Maybe this should be made public so a broader group can comment on it.

Oct 21 2024, 9:02 PM · MW-1.44-notes (1.44.0-wmf.4; 2024-11-19), SecTeam-Processed, Vuln-XSS, Vuln-Misconfiguration, I18n, MediaWiki-Internationalization, Security, Security-Team
Bawolff added a comment to T377222: Don’t use raw HTML messages in safe mode.

Also this seems more like a feature request than a security issue. Maybe this should be made public so a broader group can comment on it.

Oct 21 2024, 8:59 PM · MW-1.44-notes (1.44.0-wmf.4; 2024-11-19), SecTeam-Processed, Vuln-XSS, Vuln-Misconfiguration, I18n, MediaWiki-Internationalization, Security, Security-Team
Bawolff added a comment to T377222: Don’t use raw HTML messages in safe mode.

I feel like safemode would be difficult to use as a security feature. Its not sticky, users would have to manually type in the url of every page. edit: appearently this is a user preference now, which maybe changes things with regards to how much it makes sense as a security feature.

Oct 21 2024, 5:10 PM · MW-1.44-notes (1.44.0-wmf.4; 2024-11-19), SecTeam-Processed, Vuln-XSS, Vuln-Misconfiguration, I18n, MediaWiki-Internationalization, Security, Security-Team
Lucas_Werkmeister_WMDE added a comment to T377222: Don’t use raw HTML messages in safe mode.

@Lucas_Werkmeister_WMDE - Is this more about the convenience of having a query param to disable certain messages or is it more about trying to expand the security posture of safemode as @Krinkle alluded to? The former would likely have a simple solution, but I'd probably agree that, if it were to be implemented, it should never be enabled in Wikimedia production.

Oct 21 2024, 4:33 PM · MW-1.44-notes (1.44.0-wmf.4; 2024-11-19), SecTeam-Processed, Vuln-XSS, Vuln-Misconfiguration, I18n, MediaWiki-Internationalization, Security, Security-Team
CodeReviewBot added a comment to T377168: XSS - codesearch.wmcloud.org.

mmartorana merged https://gitlab.wikimedia.org/repos/sre/miscweb/security-landing-page/-/merge_requests/6

Oct 21 2024, 4:10 PM · Patch-For-Review, SecTeam-Processed, cloud-services-team, VPS-project-Codesearch, Vuln-XSS, Security, Security-Team
sbassett moved T377222: Don’t use raw HTML messages in safe mode from Incoming to Watching on the Security-Team board.
Oct 21 2024, 3:58 PM · MW-1.44-notes (1.44.0-wmf.4; 2024-11-19), SecTeam-Processed, Vuln-XSS, Vuln-Misconfiguration, I18n, MediaWiki-Internationalization, Security, Security-Team
sbassett assigned T193982: legends in htmlform (including Special:Preferences headers) use raw html messages to matmarex.
Oct 21 2024, 3:11 PM · MediaWiki-Internationalization, MediaWiki-User-management, SecTeam-Processed, Security, Vuln-XSS
sbassett changed the visibility for T193982: legends in htmlform (including Special:Preferences headers) use raw html messages.
Oct 21 2024, 3:11 PM · MediaWiki-Internationalization, MediaWiki-User-management, SecTeam-Processed, Security, Vuln-XSS

Oct 18 2024

matmarex closed T193982: legends in htmlform (including Special:Preferences headers) use raw html messages as Resolved.

I can't reproduce any of the problems today.

Oct 18 2024, 9:37 PM · MediaWiki-Internationalization, MediaWiki-User-management, SecTeam-Processed, Security, Vuln-XSS