As reported to security@ via Aviv Keller (@RedYetiDev), there is a reflected XSS on doc.wikimedia.org via:
https://doc.wikimedia.org/puppet/frames.html#!javascript:alert(%22XSS%22)
and similar JS payloads. These pages are generated by yard and the issue is likely the result of a general design flaw within the tool or is simply outside the scope of upstream's threat model. Either way, we could, at the very least, attempt to file an upstream security bug to see if they would be interested in addressing this. There are already some mitigations in place here on Wikimedia's end - a reasonable CSP on these pages of doc.wikimedia.org (which obviously still doesn't do much in this case) and doc.wikimedia.org being excluded from $wgCrossSiteAJAXdomains.
Files named frames.html and hosted on doc.wikimedia.org:
Status | File location |
---|---|
Fixed (removed) | /srv/doc/mediawiki-vagrant/frames.html |
Fixed (repo deleted) | /srv/doc/rubygems/mediawiki-selenium/frames.html |
Fixed (removed) | /srv/doc/rubygems/mediawiki-ruby-api/frames.html |
Fixed (removed) | /srv/doc/puppet/frames.html |
@hashar deleted mediawiki-selenium since we have long abandoned that code and the repository has been archived (T242293).