CVE-2008-5249: XSS vulnerability in MediaWiki

Related Vulnerabilities: CVE-2008-5249   CVE-2008-5250   CVE-2008-5252  

Debian Bug report logs - #508868
CVE-2008-5249: XSS vulnerability in MediaWiki

version graph

Reported by: Raphael Geissert <atomo64@gmail.com>

Date: Tue, 16 Dec 2008 04:48:01 UTC

Severity: grave

Tags: patch, security

Found in version mediawiki/1:1.13.2-1

Fixed in version mediawiki/1:1.13.3-1

Done: Romain Beauxis <toots@rastageeks.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, Mediawiki Maintenance Team <pkg-mediawiki-devel@lists.alioth.debian.org>:
Bug#508868; Package mediawiki. (Tue, 16 Dec 2008 04:48:03 GMT) (full text, mbox, link).


Message #3 received at submit@bugs.debian.org (full text, mbox, reply):

From: Raphael Geissert <atomo64@gmail.com>
To: submit@bugs.debian.org
Subject: CVE-2008-5249: XSS vulnerability in MediaWiki
Date: Mon, 15 Dec 2008 22:46:52 -0600
[Message part 1 (text/plain, inline)]
Package: mediawiki
Version: 1:1.13.2-1
Severity: grave
Tags: security patch

Hi,

The following CVE (Common Vulnerabilities & Exposures) id was published for 
mediawiki.

[0]:
> * An XSS vulnerability affecting all MediaWiki installations between
> 1.13.0 and 1.13.2. [CVE-2008-5249]

A patch fixing this and other issues can be found at [0].

If you fix the vulnerability please also make sure to include the CVE id in 
the changelog entry.

[0]http://lists.wikimedia.org/pipermail/mediawiki-announce/2008-December/000080.html
[1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5249
     http://security-tracker.debian.net/tracker/CVE-2008-5249

Cheers,
-- 
Raphael Geissert - Debian Maintainer
www.debian.org - get.debian.net
[signature.asc (application/pgp-signature, inline)]

Information forwarded to debian-bugs-dist@lists.debian.org, Mediawiki Maintenance Team <pkg-mediawiki-devel@lists.alioth.debian.org>:
Bug#508868; Package mediawiki. (Tue, 16 Dec 2008 05:06:02 GMT) (full text, mbox, link).


Message #6 received at 508868@bugs.debian.org (full text, mbox, reply):

From: Raphael Geissert <atomo64@gmail.com>
To: Romain Beauxis <toots@rastageeks.org>
Cc: control@bugs.debian.org, 508868@bugs.debian.org, 508869-quiet@bugs.debian.org, 508870-quiet@bugs.debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org
Subject: Re: mediawiki: several security issues, help wanted !
Date: Mon, 15 Dec 2008 23:02:31 -0600
[Message part 1 (text/plain, inline)]
close 508860
thanks

Hi Romain et al,

On Monday 15 December 2008, Romain Beauxis wrote:
> Package: mediawiki
> Severity: grave
> Tags: security
> Justification: user security hole
>
>
> 	Hi all !
>
> Several security issues have unfortunately been noticed [1] in mediawiki
> that may affect for some any version of the software.

Sorry for filing the extra bugs, I clicked the send email button way too fast.
I am closing this one so that we can track the issues in individual bug 
reports.

>
> Unfortunately too, I will most likely be overhelmed during the next few
> months. As a consequence, any help is much desired on this issue. That
> package is SVN maintained so it shouldn't be difficult for any interested
> contributor.
>
> Romain
>
> [1]:
> http://lists.wikimedia.org/pipermail/mediawiki-announce/2008-December/00008
>0.html

Cheers,
-- 
Raphael Geissert - Debian Maintainer
www.debian.org - get.debian.net
[signature.asc (application/pgp-signature, inline)]

Reply sent to Romain Beauxis <toots@rastageeks.org>:
You have taken responsibility. (Thu, 18 Dec 2008 02:15:03 GMT) (full text, mbox, link).


Notification sent to Raphael Geissert <atomo64@gmail.com>:
Bug acknowledged by developer. (Thu, 18 Dec 2008 02:15:03 GMT) (full text, mbox, link).


Message #11 received at 508868-close@bugs.debian.org (full text, mbox, reply):

From: Romain Beauxis <toots@rastageeks.org>
To: 508868-close@bugs.debian.org
Subject: Bug#508868: fixed in mediawiki 1:1.13.3-1
Date: Thu, 18 Dec 2008 02:02:05 +0000
Source: mediawiki
Source-Version: 1:1.13.3-1

We believe that the bug you reported is fixed in the latest version of
mediawiki, which is due to be installed in the Debian FTP archive:

mediawiki-math_1.13.3-1_amd64.deb
  to pool/main/m/mediawiki/mediawiki-math_1.13.3-1_amd64.deb
mediawiki_1.13.3-1.diff.gz
  to pool/main/m/mediawiki/mediawiki_1.13.3-1.diff.gz
mediawiki_1.13.3-1.dsc
  to pool/main/m/mediawiki/mediawiki_1.13.3-1.dsc
mediawiki_1.13.3-1_all.deb
  to pool/main/m/mediawiki/mediawiki_1.13.3-1_all.deb
mediawiki_1.13.3.orig.tar.gz
  to pool/main/m/mediawiki/mediawiki_1.13.3.orig.tar.gz



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 508868@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Romain Beauxis <toots@rastageeks.org> (supplier of updated mediawiki package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Thu, 18 Dec 2008 02:37:58 +0100
Source: mediawiki
Binary: mediawiki mediawiki-math
Architecture: source all amd64
Version: 1:1.13.3-1
Distribution: unstable
Urgency: low
Maintainer: Mediawiki Maintenance Team <pkg-mediawiki-devel@lists.alioth.debian.org>
Changed-By: Romain Beauxis <toots@rastageeks.org>
Description: 
 mediawiki  - website engine for collaborative work
 mediawiki-math - math rendering plugin for MediaWiki
Closes: 508868 508869 508870
Changes: 
 mediawiki (1:1.13.3-1) unstable; urgency=low
 .
   * New upstream release.
   * Fix CVE-2008-5249: XSS vulnerability in MediaWiki:
   "An XSS vulnerability affecting all MediaWiki installations between
    1.13.0 and 1.13.2."
   Closes: #508868
   * Fix CVE-2008-5250: several local script injection vulnerabilities
     in MediaWiki:
   "o A local script injection vulnerability affecting Internet Explorer
      clients for all MediaWiki installations with uploads enabled.
    o A local script injection vulnerability affecting clients with SVG
      scripting capability (such as Firefox 1.5+), for all MediaWiki
      installations with SVG uploads enabled."
   Closes: #508869
   * Fix CVE-2008-5252: CSRF vulnerability affecting the Special:Import
     feature in MediaWiki:
   "A CSRF vulnerability affecting the Special:Import feature, for all
    MediaWiki installations since the feature was introduced in 1.3.0."
   Closes: #508870
Checksums-Sha1: 
 3e135baf85c04b975023211c0f377bdf7709a337 1524 mediawiki_1.13.3-1.dsc
 e6b19d170629c8657742236b9f827a6df0350efd 9252548 mediawiki_1.13.3.orig.tar.gz
 774702edccd95d4359e733338c6bd80902fdfd77 29264 mediawiki_1.13.3-1.diff.gz
 324c06f073e2f7c85c20ab05ec0eb260cd2e0e98 9232080 mediawiki_1.13.3-1_all.deb
 1454f6a20f320ff82a436dae4a2d04e2d143048b 156108 mediawiki-math_1.13.3-1_amd64.deb
Checksums-Sha256: 
 f0774ca4cdb7829756e66386c90f3400b8454741ceace122c67893fdd2eb07f4 1524 mediawiki_1.13.3-1.dsc
 da6962de7156def500ff926060d1d3d1db93ab94ee97620ca5ab8e444035a244 9252548 mediawiki_1.13.3.orig.tar.gz
 0028de6fc2e5085549a8467b997d6fa73cd72ea8ea651e8d9e6a54419992d39c 29264 mediawiki_1.13.3-1.diff.gz
 60fedf1897142f4ebf44ed1a679a9897f01262302321538c0197c539b8034401 9232080 mediawiki_1.13.3-1_all.deb
 a99fd89945b28dc66db35cf7179f77ceb3a52949640e1e0d4ce2d5fc5192b478 156108 mediawiki-math_1.13.3-1_amd64.deb
Files: 
 5216b3c299a168a1d941d0cd61adfc45 1524 web optional mediawiki_1.13.3-1.dsc
 01ecf3492ea92cea62da0a9381dc53e3 9252548 web optional mediawiki_1.13.3.orig.tar.gz
 eafc8c21576f059cedd3f9c1a084f673 29264 web optional mediawiki_1.13.3-1.diff.gz
 2eda5f5c42ea32c1a8ad1607db07b1b3 9232080 web optional mediawiki_1.13.3-1_all.deb
 a8f08c9efdea29d3c08c2bb4806b07db 156108 web optional mediawiki-math_1.13.3-1_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iQEcBAEBAgAGBQJJSa0nAAoJEAC5aaocqV0Z7BcH/RQxTHk3QpC7SqOoCPCHdvNJ
D0LWdpOakbltNcGwbSR+yg//WFv0gfp28mGoVe639E5F1BIiBapmHpui3eb5rmpQ
SVZVcXlZpXuY2hdxmg15aOxql3D2HbUJ/q1OjK4Vasehg2Xzkw6NAwCXq4jJC94O
P8bC1PeIZcMG1Nk4+iTbR1hVuDMr7/Kzd6Q+oyuPaOh4VuIEF8glHAWgswqVlxLH
a2WyzF+73QWtl4YqidqDoDDivt2NVH7FqweyhdysVC0vIDBCknwtrVGX8KL0cu/u
hAJ00GASELZouT3jOWlSyXshQ+c+ubt8xgtPmKfOsUg3z1H6mL+K1VyZOy+G2oE=
=5IZk
-----END PGP SIGNATURE-----





Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Thu, 15 Jan 2009 07:30:44 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 15:30:18 2019; Machine Name: beach

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.