Greetings-

With the security/maintenance release of MediaWiki 1.31.4 / 1.32.4 / 1.33.1
[0], we would also like to provide this supplementary announcement of
wmf-deployed extensions [1] with now-public security patches and backports
[2]:

== MobileFrontend ==
* (T229541, CVE-2019-14807) - Javascript injection in edit summary on
mobile site.
<https://gerrit.wikimedia.org/r/q/I0cb918f8148d1782882e104d127f08cbfa23e542>

* (T230576, CVE-2019-15124) - XSS in edit summary for ex:MobileFrontend
Special:Watchlist
<https://gerrit.wikimedia.org/r/q/If4e91093c676de3391e6dde415c8c91c1f582998>

== CheckUser ==
* (T207094 [task to remain private], CVE-2019-16529) - Oversighted edit
summaries still visible in CheckUser results
<https://gerrit.wikimedia.org/r/q/I3d28bd9f14c1237a34afcd2e4479152f571e29a6>

== AbuseFilter ==
* (T224203 [task to remain private], CVE-2019-16528) - Oversighting the
user who performed an edit doesn't hide it from the abuse filter log
<https://gerrit.wikimedia.org/r/q/If3d3256404d0f3dbde171831937d1a816b3e2734>

The Wikimedia Security Team recommends updating these extensions to the
current master branch or supported release branches [3] as soon as
possible. As you may have noticed, some of the referenced Phabricator tasks
above are still private. Unfortunately, when security issues are reported,
sometimes sensitive information is exposed and since Phabricator is
historical, we cannot make these tasks public without exposing this
sensitive information. If you have any additional questions or concerns,
please feel free to contact secur...@wikimedia.org or file a security task
within Phabricator.

[0]
https://lists.wikimedia.org/pipermail/wikitech-l/2019-October/092656.html
[1] https://w.wiki/9hi
[2] https://phabricator.wikimedia.org/T232113
[3] https://www.mediawiki.org/wiki/Version_lifecycle

-- 
Scott Bassett
sbass...@wikimedia.org
_______________________________________________
MediaWiki announcements mailing list
To unsubscribe, go to:
https://lists.wikimedia.org/mailman/listinfo/mediawiki-announce

Reply via email to