Error
- mwversion: 1.40.0-wmf.6
- reqId: 7990957f-608e-473a-8ef2-c3d976d1be1d
- Find reqId in Logstash
[{reqId}] {exception_url} MWException: HTML attribute value can not contain a list of values
from /srv/mediawiki/php-1.40.0-wmf.6/includes/Html.php(556) #0 /srv/mediawiki/php-1.40.0-wmf.6/includes/Html.php(310): Html::expandAttributes(array) #1 /srv/mediawiki/php-1.40.0-wmf.6/includes/Html.php(215): Html::openElement(string, array) #2 /srv/mediawiki/php-1.40.0-wmf.6/includes/Html.php(240): Html::rawElement(string, array, string) #3 /srv/mediawiki/php-1.40.0-wmf.6/includes/Html.php(710): Html::element(string, array) #4 /srv/mediawiki/php-1.40.0-wmf.6/includes/Html.php(852): Html::input(string, array, string, array) #5 /srv/mediawiki/php-1.40.0-wmf.6/includes/htmlform/HTMLForm.php(1396): Html::hidden(string, array, array) #6 /srv/mediawiki/php-1.40.0-wmf.6/includes/htmlform/HTMLForm.php(1294): HTMLForm->getHiddenFields() #7 /srv/mediawiki/php-1.40.0-wmf.6/includes/htmlform/HTMLForm.php(1245): HTMLForm->getHTML(string) #8 /srv/mediawiki/php-1.40.0-wmf.6/includes/specials/pagers/ImageListPager.php(564): HTMLForm->displayForm(string) #9 /srv/mediawiki/php-1.40.0-wmf.6/includes/specials/SpecialListFiles.php(124): ImageListPager->getForm() #10 /srv/mediawiki/php-1.40.0-wmf.6/includes/specialpage/SpecialPage.php(701): SpecialListFiles->execute(NULL) #11 /srv/mediawiki/php-1.40.0-wmf.6/includes/specialpage/SpecialPageFactory.php(1451): SpecialPage->run(NULL) #12 /srv/mediawiki/php-1.40.0-wmf.6/includes/MediaWiki.php(316): MediaWiki\SpecialPage\SpecialPageFactory->executePath(string, RequestContext) #13 /srv/mediawiki/php-1.40.0-wmf.6/includes/MediaWiki.php(904): MediaWiki->performRequest() #14 /srv/mediawiki/php-1.40.0-wmf.6/includes/MediaWiki.php(562): MediaWiki->main() #15 /srv/mediawiki/php-1.40.0-wmf.6/index.php(50): MediaWiki->run() #16 /srv/mediawiki/php-1.40.0-wmf.6/index.php(46): wfIndexMain() #17 /srv/mediawiki/w/index.php(3): require(string) #18 {main}
Impact
Notes
Four such requests happened at the same time all targeting aawiki, I suspect it is part of a penetration testing script similar to T321267 or T321133.
They all had the same url path: /wiki/Special:ListFiles?acx[[%24{98991*97996}]]xca&limit=20&user=<someusername>
A couple additional one tried to do some JavaScript injection.