Page MenuHomePhabricator

Write and send supplementary release announcement for extensions and skins with security patches (1.35.6/1.36.4/1.37.2)
Closed, ResolvedPublic

Related Objects

Event Timeline

There are a very large number of changes, so older changes are hidden. Show Older Changes
Reedy renamed this task from Write and send supplementary release announcement for extensions and skins with security patches (1.35.5/1.36.3/1.37.1) to Write and send supplementary release announcement for extensions and skins with security patches (1.35.6/1.36.4/1.37.2).Dec 15 2021, 9:11 PM
sbassett updated the task description. (Show Details)
sbassett updated the task description. (Show Details)
sbassett updated the task description. (Show Details)
sbassett updated the task description. (Show Details)
sbassett updated the task description. (Show Details)
sbassett added a project: Security-Team.
sbassett moved this task from Incoming to In Progress on the Security-Team board.

Freezing task and dividing up CVE requests for release (to be sent out later this week or early next):

  1. @mmartorana: 1 through 4
  2. @sbassett: 5 through 8
  3. @Mstyles: 9 through 12
sbassett updated the task description. (Show Details)

{{draft}}

Subject: MediaWiki Extensions and Skins Security Release Supplement (1.35.6/1.36.4/1.37.2)

Greetings-

With the security/maintenance release of MediaWiki 1.35.6/1.36.4/1.37.2 [0], we would also like to provide this supplementary announcement of MediaWiki extensions and skins with now-public Phabricator tasks, security patches and backports [1]:

ExName 1

+ (Txxxxxx, CVE-2021-yyyyy) - Bug title
<gerrit url>

ExName 2

+ (Txxxxxx, CVE-2021-yyyyy) - Bug title
<gerrit url>

ExName 3

+ (Txxxxxx, CVE-2021-yyyyy) - Bug title
<gerrit url>

ExName 4

+ (Txxxxxx, CVE-2021-yyyyy) - Bug title
<gerrit url>

ExName 5

+ (Txxxxxx, CVE-2021-yyyyy) - Bug title
<gerrit url>

ExName 6

+ (Txxxxxx, CVE-2021-yyyyy) - Bug title
<gerrit url>

ExName 7

+ (Txxxxxx, CVE-2021-yyyyy) - Bug title
<gerrit url>

ExName 8

+ (Txxxxxx, CVE-2021-yyyyy) - Bug title
<gerrit url>

ExName 9

+ (Txxxxxx, CVE-2021-yyyyy) - Bug title
<gerrit url>

ExName 10

+ (Txxxxxx, CVE-2021-yyyyy) - Bug title
<gerrit url>

ExName 11

+ (Txxxxxx, CVE-2021-yyyyy) - Bug title
<gerrit url>

ExName 12

+ (Txxxxxx, CVE-2021-yyyyy) - Bug title
<gerrit url>

ExName 13

+ (Txxxxxx, CVE-2021-yyyyy) - Bug title
<gerrit url>== ExName 10 ==

The Wikimedia Security Team recommends updating these extensions and/or skins to the current master branch or relevant, supported release branch [2] as soon as possible. Some of the referenced Phabricator tasks above _may_ still be private. Unfortunately, when security issues are reported, sometimes sensitive information is exposed and since Phabricator is historical, we cannot make these tasks public without exposing this sensitive information. If you have any additional questions or concerns regarding this update, please feel free to contact security@wikimedia.org or file a security task within Phabricator [3].

[0] https://w.wiki/52Am
[1] https://phabricator.wikimedia.org/T297839
[2] https://www.mediawiki.org/wiki/Version_lifecycle
[3] https://www.mediawiki.org/wiki/Reporting_security_bugs

{{draft}}

Subject: MediaWiki Extensions and Skins Security Release Supplement (1.35.6/1.36.4/1.37.2)

Greetings-

With the security/maintenance release of MediaWiki 1.35.6/1.36.4/1.37.2 [0], we would also like to provide this supplementary announcement of MediaWiki extensions and skins with now-public Phabricator tasks, security patches and backports [1]:

Echo

+ (T285116, CVE-2022-28324) - Echo does not set X-Forwarded-For for internal API requests, some of which get logged to CU
https://gerrit.wikimedia.org/r/q/mediawiki/extensions/Echo/+/777008/

GrowthExperiments

+ (T298019, CVE-2022-28326) - i18n XSS in GrowthExperiments suggested edits pager
<gerrit url>

MobileFrontend

+ (T298581, CVE-2022-28325) - Mobile version of Special:Contributions leaks existence of globally suppressed users
https://gerrit.wikimedia.org/r/q/mediawiki/extensions/MobileFrontend/+/751934/

SecurePoll

+ (T298434, CVE-2022-28323) - SecurePoll leaks voter's exact vote timestamp
<gerrit url>

FileImporter

+ (T294256, CVE-2022-28206) - FileImporter allows imports to cascade protected files when the importer does not have administrator permissions
<gerrit url>

GrowthExperiments

+ (T298312, CVE-2022-28207) - Special:Impact leaks suppressed usernames
https://gerrit.wikimedia.org/r/q/mediawiki/extensions/GrowthExperiments/+/775927/

CentralAuth

+ (T302248, CVE-2022-28205) - CentralAuth expiring global groups do not expire
<gerrit url>

Wikibase

+ (T302215, CVE-2022-28208) - HTML injection / XSS from i18n message in WikibaseClient edit hook
https://gerrit.wikimedia.org/r/q/mediawiki/extensions/Wikibase/+/776032/

JsonConfig

+ (T302192, CVE-2021-28210) - Data fields in Commons tabular datasets allow running arbitrary JS
<gerrit url>

TimedMediaHandler

+ (T160800, CVE-2022-28211) - TimedMediaHandler doesn't prevent blocked users from restarting transcodes
<gerrit url>

AntiSpoof

+ (T304126, CVE-2022-28209) - One of the checks for 'override-antispoof' permission is inverted
<gerrit url>

FlaggedRevs

+ (T304354, CVE-2022-28212) - It is impossible to oversight who has reviewed a revision via FlaggedRevs
<gerrit url>

CentralAuth

+ (T226212, CVE-2022-28322) - Global rename log shows timestamp of suppressed action
<gerrit url>== ExName 10 ==

The Wikimedia Security Team recommends updating these extensions and/or skins to the current master branch or relevant, supported release branch [2] as soon as possible. Some of the referenced Phabricator tasks above _may_ still be private. Unfortunately, when security issues are reported, sometimes sensitive information is exposed and since Phabricator is historical, we cannot make these tasks public without exposing this sensitive information. If you have any additional questions or concerns regarding this update, please feel free to contact security@wikimedia.org or file a security task within Phabricator [3].

[0] https://w.wiki/52Am
[1] https://phabricator.wikimedia.org/T297839
[2] https://www.mediawiki.org/wiki/Version_lifecycle
[3] https://www.mediawiki.org/wiki/Reporting_security_bugs

@mmartorana - looking pretty good, once we get the rest of the gerrit urls in there...

{{draft}}

Subject: MediaWiki Extensions and Skins Security Release Supplement (1.35.6/1.36.4/1.37.2)

Greetings-

With the security/maintenance release of MediaWiki 1.35.6/1.36.4/1.37.2 [0], we would also like to provide this supplementary announcement of MediaWiki extensions and skins with now-public Phabricator tasks, security patches and backports [1]:

Echo

+ (T285116, CVE-2022-28324) - Echo does not set X-Forwarded-For for internal API requests, some of which get logged to CU
https://gerrit.wikimedia.org/r/q/I0551fe64042676f8a2b35afb82a3b4e9c09ea673

GrowthExperiments

+ (T298019, CVE-2022-28326) - i18n XSS in GrowthExperiments suggested edits pager
https://gerrit.wikimedia.org/r/q/Iadc224a038ef0cec072cc1d6b84277355648f9f9

MobileFrontend

+ (T298581, CVE-2022-28325) - Mobile version of Special:Contributions leaks existence of globally suppressed users
https://gerrit.wikimedia.org/r/q/I4dbb315226af267d43154d1a5a5c4635d68d1038

SecurePoll

+ (T298434, CVE-2022-28323) - SecurePoll leaks voter's exact vote timestamp
https://gerrit.wikimedia.org/r/q/I4dbb315226af267d43154d1a5a5c4635d68d1038

FileImporter

+ (T294256, CVE-2022-28206) - FileImporter allows imports to cascade protected files when the importer does not have administrator permissions
https://gerrit.wikimedia.org/r/c/mediawiki/extensions/FileImporter/+/757022

GrowthExperiments

+ (T298312, CVE-2022-28207) - Special:Impact leaks suppressed usernames
https://gerrit.wikimedia.org/r/q/mediawiki/extensions/GrowthExperiments/+/775927/

CentralAuth

+ (T302248, CVE-2022-28205) - CentralAuth expiring global groups do not expire
https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CentralAuth/+/765336
https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CentralAuth/+/765335

Wikibase

+ (T302215, CVE-2022-28208) - HTML injection / XSS from i18n message in WikibaseClient edit hook
https://gerrit.wikimedia.org/r/q/Ife8620d65577e53b03ef4674f54d1684e2f5a773

JsonConfig

+ (T302192, CVE-2021-28210) - Data fields in Commons tabular datasets allow running arbitrary JS
https://gerrit.wikimedia.org/r/q/Ifa2f6ec9ccce3b781e83a9905392e70d6a7340ad

TimedMediaHandler

+ (T160800, CVE-2022-28211) - TimedMediaHandler doesn't prevent blocked users from restarting transcodes
https://gerrit.wikimedia.org/r/q/I285c7c189af350be22f5de7b1c6757ad7479a20c

AntiSpoof

+ (T304126, CVE-2022-28209) - One of the checks for 'override-antispoof' permission is inverted
https://gerrit.wikimedia.org/r/q/Id8c4e2e336695ce70ccdf8a51ad729bf4a99f8f7

FlaggedRevs

+ (T304354, CVE-2022-28212) - It is impossible to oversight who has reviewed a revision via FlaggedRevs
https://gerrit.wikimedia.org/r/q/I563bc73829d3a7c6349d364287ba42df78f3c91a

CentralAuth

+ (T226212, CVE-2022-28322) - Global rename log shows timestamp of suppressed action
https://gerrit.wikimedia.org/r/q/Ica7fedf10a4a8cca3d4b811ff05bfd5553753603

The Wikimedia Security Team recommends updating these extensions and/or skins to the current master branch or relevant, supported release branch [2] as soon as possible. Some of the referenced Phabricator tasks above _may_ still be private. Unfortunately, when security issues are reported, sometimes sensitive information is exposed and since Phabricator is historical, we cannot make these tasks public without exposing this sensitive information. If you have any additional questions or concerns regarding this update, please feel free to contact security@wikimedia.org or file a security task within Phabricator [3].

[0] https://w.wiki/52Am
[1] https://phabricator.wikimedia.org/T297839
[2] https://www.mediawiki.org/wiki/Version_lifecycle
[3] https://www.mediawiki.org/wiki/Reporting_security_bugs

sbassett changed the visibility from "acl*security (Project)" to "Public (No Login Required)".
sbassett changed the edit policy from "acl*security (Project)" to "All Users".
sbassett moved this task from In Progress to Done on the user-sbassett board.
sbassett moved this task from In Progress to Our Part Is Done on the Security-Team board.

Just as a note, a lot of these cves for extensions seem to have the product field set to mediawiki, and the version numbers of affected versions set to mediawiki core versions. This is pretty confusing for the extensions not bundled with mediawiki core. I think its causing confusion in downstream packagers of mediawiki - e.g. https://bugzilla.redhat.com/show_bug.cgi?id=2161180 which doesn't make much sense

Just as a note, a lot of these cves for extensions seem to have the product field set to mediawiki, and the version numbers of affected versions set to mediawiki core versions. This is pretty confusing for the extensions not bundled with mediawiki core. I think its causing confusion in downstream packagers of mediawiki - e.g. https://bugzilla.redhat.com/show_bug.cgi?id=2161180 which doesn't make much sense

We can try to standardize this a bit more for the supplemental releases, but as noted on the other bug, sometimes Mitre changes these inputs from our original submissions. Most mediawiki extensions also track with core releases AFAIK, which is what we try to work with by default, if those release branches exist. If an extension _doesn't_ follow that paradigm, we try to note that within the release and at least link to any master/main backports.