Page MenuHomePhabricator

Grunny (Grunny)
VP of Engineering @ Fandom

Today

  • No visible events.

Tomorrow

  • No visible events.

Friday

  • No visible events.

User Details

User Since
Oct 7 2014, 10:12 AM (592 w, 1 d)
Availability
Available
LDAP User
Grunny
MediaWiki User
Grunny [ Global Accounts ]

Recent Activity

Apr 7 2025

Grunny added a comment to T391150: Audit Phabricator security policies and groups membership.

Just making a note pre-emptively about making sure my access for Fandom security release management (and checking for reports in our bug bounty program with HackerOne) is maintained, as my account was caught up in the clean up in last year's one. Though I have MFA and will have commented here so I assume wouldn't be included.

Apr 7 2025, 3:22 PM · SecTeam-Processed, Phabricator, Security-Team

Jun 25 2024

Grunny updated Grunny.
Jun 25 2024, 9:12 PM

Jun 24 2024

Grunny added a comment to T337305: Audit members of acl*security for more than 12 months of no activity (May 2024).

Great, thanks @sbassett!

Jun 24 2024, 8:50 PM · SecTeam-Processed, Security-Team, Phabricator, Security

Jun 23 2024

Grunny added a comment to T337305: Audit members of acl*security for more than 12 months of no activity (May 2024).

Was I caught up in this cleanup by chance @sbassett? I noticed my access seems to be gone. If so, could I be readded? I use the access for Fandom for pre-release access and checking for any crossover with our bug bounty program we run.

Jun 23 2024, 8:52 PM · SecTeam-Processed, Security-Team, Phabricator, Security

Mar 7 2023

Grunny updated subscribers of T331065: CVE-2023-37254: Extension:Cargo XSS in Special:CargoQuery using default format.
Mar 7 2023, 9:35 PM · Vuln-XSS, MediaWiki-extensions-Cargo, Security, Security-Team
Grunny updated subscribers of T331311: CVE-2023-37256: Cargo allows storing javascript URLs in URL fields, and automatically linking them.
Mar 7 2023, 9:34 PM · MediaWiki-extensions-Cargo, Security, Security-Team
Grunny updated subscribers of T331321: CVE-2023-29133: XSS in Searchtext formatter in Cargo.
Mar 7 2023, 9:34 PM · Vuln-XSS, MediaWiki-extensions-Cargo, Security, Security-Team

Dec 10 2021

Grunny updated subscribers of T297322: CVE-2021-44857, CVE-2021-44858: Unauthorized users can undo edits on any protected page and view contents of private wikis using mcrundo .
Dec 10 2021, 1:13 PM · MW-1.38-notes (1.38.0-wmf.18; 2022-01-17), MW-1.37-notes, MW-1.36-notes, MW-1.35-notes, MediaWiki-General, Core Platform Team Initiatives (MCR), Wikimedia-Incident, Vuln-Infoleak, Security, Security-Team

Dec 9 2021

Grunny added a comment to T297322: CVE-2021-44857, CVE-2021-44858: Unauthorized users can undo edits on any protected page and view contents of private wikis using mcrundo .

Thanks @Ladsgroup! We'll patch it on our side privately.

Dec 9 2021, 5:31 PM · MW-1.38-notes (1.38.0-wmf.18; 2022-01-17), MW-1.37-notes, MW-1.36-notes, MW-1.35-notes, MediaWiki-General, Core Platform Team Initiatives (MCR), Wikimedia-Incident, Vuln-Infoleak, Security, Security-Team

Mar 22 2021

Grunny added a comment to T278014: CVE-2021-30154: Unescaped messages used in HTML on Special:NewFiles.

Thanks, @sbassett ! Just for my reference on if I find any more of these in core or WMF deployed extensions, is it OK to push straight to Gerrit, and I assume we'd still want a ticket created for reference?

I would say likely, yes. However it's probably a good idea to continue filing these as private bugs so the Security-Team can review them (our weekly clinic meeting is Monday morning) just to verify they are indeed low-risk and to also time them well for the weekly train deployment, in getting pushed to gerrit.

Sounds good, thanks!

Mar 22 2021, 6:38 PM · MW-1.31-release-notes, MW-1.31-release, MW-1.35-notes, MW-1.36-notes (1.36.0-wmf.36; 2021-03-23), SecTeam-Processed, MW-1.35-release, MediaWiki-Special-pages, Vuln-XSS, Security, Security-Team
Grunny added a comment to T278014: CVE-2021-30154: Unescaped messages used in HTML on Special:NewFiles.

Thanks, @sbassett ! Just for my reference on if I find any more of these in core or WMF deployed extensions, is it OK to push straight to Gerrit, and I assume we'd still want a ticket created for reference?

Mar 22 2021, 5:59 PM · MW-1.31-release-notes, MW-1.31-release, MW-1.35-notes, MW-1.36-notes (1.36.0-wmf.36; 2021-03-23), SecTeam-Processed, MW-1.35-release, MediaWiki-Special-pages, Vuln-XSS, Security, Security-Team

Mar 21 2021

Grunny added a comment to T278058: CVE-2021-30157: Unescaped messages used in HTML on ChangesList pages (e.g. RecentChanges and Watchlist).

Proposed patch:

Mar 21 2021, 6:06 PM · MW-1.31-release-notes, MW-1.35-notes, MW-1.36-notes (1.36.0-wmf.36; 2021-03-23), SecTeam-Processed, MW-1.35-release, MW-1.31-release, MediaWiki-Special-pages, Vuln-XSS, Security, Security-Team
Grunny added projects to T278058: CVE-2021-30157: Unescaped messages used in HTML on ChangesList pages (e.g. RecentChanges and Watchlist): Vuln-XSS, MediaWiki-Special-pages.
Mar 21 2021, 6:02 PM · MW-1.31-release-notes, MW-1.35-notes, MW-1.36-notes (1.36.0-wmf.36; 2021-03-23), SecTeam-Processed, MW-1.35-release, MW-1.31-release, MediaWiki-Special-pages, Vuln-XSS, Security, Security-Team
Grunny added a subtask for T2212: Some MediaWiki: messages not safe in HTML (tracking): T278058: CVE-2021-30157: Unescaped messages used in HTML on ChangesList pages (e.g. RecentChanges and Watchlist).
Mar 21 2021, 6:01 PM · Tracking-Neverending, I18n, MediaWiki-Internationalization
Grunny added a parent task for T278058: CVE-2021-30157: Unescaped messages used in HTML on ChangesList pages (e.g. RecentChanges and Watchlist): T2212: Some MediaWiki: messages not safe in HTML (tracking).
Mar 21 2021, 6:01 PM · MW-1.31-release-notes, MW-1.35-notes, MW-1.36-notes (1.36.0-wmf.36; 2021-03-23), SecTeam-Processed, MW-1.35-release, MW-1.31-release, MediaWiki-Special-pages, Vuln-XSS, Security, Security-Team
Grunny created T278058: CVE-2021-30157: Unescaped messages used in HTML on ChangesList pages (e.g. RecentChanges and Watchlist).
Mar 21 2021, 6:01 PM · MW-1.31-release-notes, MW-1.35-notes, MW-1.36-notes (1.36.0-wmf.36; 2021-03-23), SecTeam-Processed, MW-1.35-release, MW-1.31-release, MediaWiki-Special-pages, Vuln-XSS, Security, Security-Team

Mar 20 2021

Grunny added a project to T278014: CVE-2021-30154: Unescaped messages used in HTML on Special:NewFiles: Vuln-XSS.
Mar 20 2021, 4:08 PM · MW-1.31-release-notes, MW-1.31-release, MW-1.35-notes, MW-1.36-notes (1.36.0-wmf.36; 2021-03-23), SecTeam-Processed, MW-1.35-release, MediaWiki-Special-pages, Vuln-XSS, Security, Security-Team
Grunny added a subtask for T2212: Some MediaWiki: messages not safe in HTML (tracking): T278014: CVE-2021-30154: Unescaped messages used in HTML on Special:NewFiles.
Mar 20 2021, 4:03 PM · Tracking-Neverending, I18n, MediaWiki-Internationalization
Grunny added a parent task for T278014: CVE-2021-30154: Unescaped messages used in HTML on Special:NewFiles: T2212: Some MediaWiki: messages not safe in HTML (tracking).
Mar 20 2021, 4:03 PM · MW-1.31-release-notes, MW-1.31-release, MW-1.35-notes, MW-1.36-notes (1.36.0-wmf.36; 2021-03-23), SecTeam-Processed, MW-1.35-release, MediaWiki-Special-pages, Vuln-XSS, Security, Security-Team
Grunny added a comment to T278014: CVE-2021-30154: Unescaped messages used in HTML on Special:NewFiles.

Proposed patch:

Mar 20 2021, 4:02 PM · MW-1.31-release-notes, MW-1.31-release, MW-1.35-notes, MW-1.36-notes (1.36.0-wmf.36; 2021-03-23), SecTeam-Processed, MW-1.35-release, MediaWiki-Special-pages, Vuln-XSS, Security, Security-Team
Grunny created T278014: CVE-2021-30154: Unescaped messages used in HTML on Special:NewFiles.
Mar 20 2021, 3:59 PM · MW-1.31-release-notes, MW-1.31-release, MW-1.35-notes, MW-1.36-notes (1.36.0-wmf.36; 2021-03-23), SecTeam-Processed, MW-1.35-release, MediaWiki-Special-pages, Vuln-XSS, Security, Security-Team

Feb 26 2021

Grunny added a watcher for Security-Team: Grunny.
Feb 26 2021, 3:12 PM
Grunny added a comment to T194726: Cargo SQL injection on Special:Drilldown.

Since this was fixed a while ago, should this bug be made public now?

Feb 26 2021, 2:59 PM · Vuln-Inject, Security, MediaWiki-extensions-Cargo

Dec 9 2020

Grunny updated subscribers of T269718: RCE in Widgets extension (CVE-2020-35625).
Dec 9 2020, 6:13 PM · Vuln-DirectObjectReference, Vuln-MissingAuthz, ShoutWiki, MediaWiki-extensions-Widgets, Security
Grunny added a comment to T269718: RCE in Widgets extension (CVE-2020-35625).

Thanks for letting us know! Yeah, Gamepedia wikis are using it.

Dec 9 2020, 6:08 PM · Vuln-DirectObjectReference, Vuln-MissingAuthz, ShoutWiki, MediaWiki-extensions-Widgets, Security

Jan 6 2020

Grunny added a comment to T241781: Audit members of #security for more than x duration of no activity (Jan 2020).

I see my name is on the list. I unfortunately haven't been as active as a volunteer for a while, but for some context, part of why I was originally given access here is related to my role at Fandom, providing early access to security releases for Fandom and Gamepedia so we can prepare and protect our user base quickly. I still use it for this purpose for each security release, and as we plan to launch a bug bounty for our wikis on Fandom and Gamepedia in the coming year which will include core MediaWiki (once we're on a newer MW version), I'd love to discuss collaborating more closely on it. :)

Jan 6 2020, 4:35 PM · Security, Phabricator, Security-Team

May 15 2018

Grunny added a comment to T194726: Cargo SQL injection on Special:Drilldown.

Hi @Yaron_Koren ! For the query being executed above, I'd suggest not doing the string replace with the quotes but instead using Database::addQuotes or at least Database::strencode.

May 15 2018, 5:48 PM · Vuln-Inject, Security, MediaWiki-extensions-Cargo
Grunny updated the task description for T194726: Cargo SQL injection on Special:Drilldown.
May 15 2018, 4:27 PM · Vuln-Inject, Security, MediaWiki-extensions-Cargo
Grunny moved T194726: Cargo SQL injection on Special:Drilldown from Backlog / Other to External (Non-WMF) Issues on the acl*security board.
May 15 2018, 7:31 AM · Vuln-Inject, Security, MediaWiki-extensions-Cargo
Grunny created T194726: Cargo SQL injection on Special:Drilldown.
May 15 2018, 7:05 AM · Vuln-Inject, Security, MediaWiki-extensions-Cargo

May 2 2018

Grunny added a comment to T118131: Credit security researchers that identify and disclose vulnerabilities.

@Bawolff this is great. One thought I had from looking at https://www.mediawiki.org/wiki/Reporting_security_bugs and https://www.mediawiki.org/wiki/Wikimedia_Security_Team/Thanks is that they both only mention credit for vulnerabilities found in MediaWiki core or a bundled extension. I feel one missing part will be crediting those who report security issues in Wikimedia-deployed extension. These may not make sense to credit in the MW core CREDITS file as the issues weren't part of the code distributed in the tarballs, but it does seem worthwhile to also find a nice place to credit those who reported security issues that affected Wikimedia wikis such as through a deployed extension, as they're helping keep Wikimedia projects secure even if it's not an issue that is part of core or a bundled extension. What do you think?

May 2 2018, 3:35 PM · Security-Team, Developer-Advocacy

Apr 5 2017

Grunny added a comment to T140591: MediaWiki 1.28.1/1.27.2/1.23.16 security release.

Thanks, @Reedy! Found one more issue in the patches for MW 1.23. In the patch for T108138, the calls to getUserPermissionsErrorsInternal are passing the undefined variable $rigor as MW 1.23 is still using the boolean $doExpensiveQueries instead. The call to Title::userCan should also probably use a boolean true instead of 'secure' for consistency.

Apr 5 2017, 9:09 AM · Security, Security-Team, MediaWiki-General

Apr 4 2017

Grunny added a comment to T140591: MediaWiki 1.28.1/1.27.2/1.23.16 security release.

For the MW 1.23 patch for T108138, it looks like $user is undefined in the Title::userCan call as well, as it currently repeatedly calls $this->getUser() rather than storing it in a $user variable.

Apr 4 2017, 4:36 PM · Security, Security-Team, MediaWiki-General
Grunny added a comment to T140591: MediaWiki 1.28.1/1.27.2/1.23.16 security release.

I believe the patch for MW 1.23 related to T48143 will break as it adds the call to parser::normalizeLinkUrl but the Parser::normalizeLinkUrl method does not exist in MW 1.23, as it is still using Parser::replaceUnusualEscapes instead.

Apr 4 2017, 1:40 PM · Security, Security-Team, MediaWiki-General

Mar 20 2017

Grunny added a comment to T134863: Reflected XSS in GlobalGroupPermissions.

@dpatrick Looks like https://gerrit.wikimedia.org/r/#/c/319055/ was merged in February and is now live, so I think this can be closed and made public once it's announced as part of the fixes released in T134863?

Mar 20 2017, 10:49 AM · Security, Patch-For-Review, Security-Team, MediaWiki-extensions-CentralAuth, Vuln-XSS, Security-Extensions

Jan 18 2017

Grunny added a comment to T134863: Reflected XSS in GlobalGroupPermissions.

@dpatrick looks like the PoC https://www.mediawiki.org/wiki/Special:GlobalGroupPermissions?wpGroup=%3Cscript%3Ealert%28document.domain%29%3C/script%3E works again, did the patch get reverted?

Jan 18 2017, 3:37 PM · Security, Patch-For-Review, Security-Team, MediaWiki-extensions-CentralAuth, Vuln-XSS, Security-Extensions

May 10 2016

Grunny added a comment to T134863: Reflected XSS in GlobalGroupPermissions.

Here's a quick patch to fix the issue:

May 10 2016, 11:37 AM · Security, Patch-For-Review, Security-Team, MediaWiki-extensions-CentralAuth, Vuln-XSS, Security-Extensions
Grunny created T134863: Reflected XSS in GlobalGroupPermissions.
May 10 2016, 11:36 AM · Security, Patch-For-Review, Security-Team, MediaWiki-extensions-CentralAuth, Vuln-XSS, Security-Extensions

Apr 25 2016

Grunny added a comment to T133507: Careless use of $wgExternalLinkTarget is insecure.

I dunno, I think we could just set rel="noopener" on external links and document this.

That sounds like a reasonable response to me.

Just something to keep in mind, rel="noopener" only works on Chrome and Opera, and does not work in Firefox, Safari, IE, and Edge.

Apr 25 2016, 9:24 AM · Security, Wikimedia-Performance-publish, Performance-Team, Patch-For-Review

Dec 17 2015

Grunny added a comment to T115722: MediaWiki Security release 1.25.4.

LGTM. :)

Dec 17 2015, 5:15 PM · Security, OKR-Work, Release
Grunny added a comment to T119309: User::matchEditToken should use constant-time string comparison.

The backport patches for this to MW 1.23 and 1.24 should also use hash_equals in the check in the return of the method as well, i.e. here: https://github.com/wikimedia/mediawiki/blob/REL1_24/includes/User.php#L3939 and https://github.com/wikimedia/mediawiki/blob/REL1_23/includes/User.php#L3814. And they should both also probably have the same done for User::matchEditTokenNoSuffix.

Dec 17 2015, 1:55 PM · Security, MW-1.27-release-notes, MW-1.27-release (WMF-deploy-2016-01-12_(1.27.0-wmf.10)), MW-1.25-release, MW-1.26-release, MW-1.23-release, MW-1.24-release, Patch-For-Review, MediaWiki-General, Security-Core
Grunny added a comment to T115722: MediaWiki Security release 1.25.4.

The patches for T119309 in MW 1.23 and 1.24 should use hash_equals in the check in the return of the method as well, i.e. here: https://github.com/wikimedia/mediawiki/blob/REL1_24/includes/User.php#L3939 and https://github.com/wikimedia/mediawiki/blob/REL1_23/includes/User.php#L3814. And they should both also probably have the same done for User::matchEditTokenNoSuffix.

Dec 17 2015, 1:54 PM · Security, OKR-Work, Release

Oct 23 2015

Grunny added a watcher for acl*security: Grunny.
Oct 23 2015, 5:44 PM
Grunny added a comment to T115735: Security bugs access for Grunny.

@Qgil @csteipp signed.

Oct 23 2015, 4:24 PM · WMF-NDA-Requests

Oct 16 2015

Grunny created T115735: Security bugs access for Grunny.
Oct 16 2015, 5:51 PM · WMF-NDA-Requests

Sep 3 2015

Grunny added a comment to T111029: XSS possible in PageTriage toolbar.

Quick patch to URL encode the title:

The problem is not lack of url encoding, it's lack of html encoding. URL encoding was also lacking, and doing that will fix certain current PageTriage bugs (e.g. some pages with quotmarks weren't working properly). But from a security perspective this isn't solved yet.

Sep 3 2015, 5:29 AM · Security, MW-1.27-release (WMF-deploy-2015-11-10_(1.27.0-wmf.6)), Patch-For-Review, Collaboration-Team-Archive-2015-2016, Vuln-XSS, PageTriage

Sep 1 2015

Grunny updated the task description for T111029: XSS possible in PageTriage toolbar.
Sep 1 2015, 7:12 PM · Security, MW-1.27-release (WMF-deploy-2015-11-10_(1.27.0-wmf.6)), Patch-For-Review, Collaboration-Team-Archive-2015-2016, Vuln-XSS, PageTriage
Grunny updated the task description for T111029: XSS possible in PageTriage toolbar.
Sep 1 2015, 2:38 PM · Security, MW-1.27-release (WMF-deploy-2015-11-10_(1.27.0-wmf.6)), Patch-For-Review, Collaboration-Team-Archive-2015-2016, Vuln-XSS, PageTriage
Grunny added a comment to T111029: XSS possible in PageTriage toolbar.

Quick patch to URL encode the title:

Sep 1 2015, 11:24 AM · Security, MW-1.27-release (WMF-deploy-2015-11-10_(1.27.0-wmf.6)), Patch-For-Review, Collaboration-Team-Archive-2015-2016, Vuln-XSS, PageTriage
Grunny renamed T111029: XSS possible in PageTriage toolbar from to XSS possible in PageTriage toolbar.
Sep 1 2015, 11:22 AM · Security, MW-1.27-release (WMF-deploy-2015-11-10_(1.27.0-wmf.6)), Patch-For-Review, Collaboration-Team-Archive-2015-2016, Vuln-XSS, PageTriage

Jun 26 2015

Grunny added a comment to T103391: Reflected XSS vulnerabilities in Semantic Forms.

It looks like the patches were pushed to Gerrit and merged: https://gerrit.wikimedia.org/r/220839

Jun 26 2015, 1:50 PM · Security, Vuln-XSS, Security-Team, MediaWiki-extensions-Page_Forms

Jun 23 2015

Grunny added a comment to T103391: Reflected XSS vulnerabilities in Semantic Forms.

There are some more vulnerable parameters not covered by that patch:

Jun 23 2015, 2:15 AM · Security, Vuln-XSS, Security-Team, MediaWiki-extensions-Page_Forms

Jun 22 2015

Grunny renamed T103391: Reflected XSS vulnerabilities in Semantic Forms from to Reflected XSS vulnerabilities in Semantic Forms.
Jun 22 2015, 5:54 PM · Security, Vuln-XSS, Security-Team, MediaWiki-extensions-Page_Forms