User Details
- User Since
- Apr 9 2019, 9:07 PM (357 w, 11 h)
- Availability
- Available
- LDAP User
- MarkusRost
- MediaWiki User
- MarkusRost [ Global Accounts ]
Sep 2 2025
Aug 24 2025
Jun 30 2025
Getting this error in https://github.com/openzim/mwoffliner/issues/2401 trying to parse https://de.wikipedia.org/wiki/Liste_der_Schlangenarten using Parsoid:
https://de.wikipedia.org/w/api.php?action=parse&format=json&prop=text&parsoid=1&page=Liste_der_Schlangenarten
May 29 2025
Feb 18 2025
The typo should actually be rest.php/oauth2?grant_type=
Jan 21 2025
I have just tested it and this issue exists for mwoauth-authonlyprivate as well, allowing the consumer to keep accessing my email address without me being aware of it or having any way to prevent it.
Security-Team I have found an abuse vector for this issue. While the new access tokens are invalid for editing the wiki, they are still valid for the identify endpoint oauth2/resource/profile.
Nov 8 2024
May 6 2024
Jul 2 2023
May 7 2023
While I can't see a clear abuse vector due to the Cannot create access token, user did not approve issuing this access token error, this still feels a lot like a security issue. Therefore I'm escalating just to be sure.
May 6 2023
Jun 30 2022
I think having edits to abuse filter hidden from recent changes is problematic for admins. It's currently possible that admins will never notice the existence of new filters which might cause problems later on. Trying to solve issues of editors is also made a lot harder when admins don't know that there was a recent abuse filter change which causes the issue.
Jan 4 2021
Wouldn't returning a permissions error be the better message? That message should already exist as well and the user is in fact missing the permission to protect to that level.