Bug 1052962 (CVE-2013-6451, CVE-2013-6452, CVE-2013-6453, CVE-2013-6454, CVE-2013-6472)

Summary: CVE-2013-6451 CVE-2013-6452 CVE-2013-6453 CVE-2013-6454 CVE-2013-6472 mediawiki: security releases 1.22.1, 1.21.4 and 1.19.10
Product: [Other] Security Response Reporter: Ratul Gupta <ratulg>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: dan.mashal, gwync, ian, mike, puiterwijk
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard: impact=moderate,public=20140114,reported=20140114,source=gentoo,cvss2=5.8/AV:N/AC:M/Au:N/C:P/I:P/A:N,fedora-all/mediawiki=notaffected,epel-5/mediawiki=wontfix,epel-6/mediawiki119=notaffected
Fixed In Version: mediawiki 1.22.1, mediawiki 1.21.4, mediawiki 1.19.10 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2015-09-05 19:04:16 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---
Bug Depends On: 1052874, 1052913, 1052965    
Bug Blocks:    

Description Ratul Gupta 2014-01-14 14:04:26 UTC
These flaws were fixed in the recently-released MediaWiki 1.22.1, 1.21.4, and 1.19.10 releases:

* MediaWiki user Michael M reported that the fix for bug 55332 (CVE-2013-4568) allowed insertion of escaped CSS values which could pass the CSS validation checks, resulting in XSS. (CVE-2013-6451)
<https://bugzilla.wikimedia.org/show_bug.cgi?id=58088>

* Chris from RationalWiki reported that SVG files could be uploaded that include external stylesheets, which could lead to XSS when an XSL was used to include JavaScript. (CVE-2013-6452)
https://bugzilla.wikimedia.org/show_bug.cgi?id=57550

* During internal review, it was discovered that MediaWiki's SVG sanitization could be bypassed when the XML was considered invalid. (CVE-2013-6453)
https://bugzilla.wikimedia.org/show_bug.cgi?id=58553

* During internal review, it was discovered that MediaWiki's CSS sanitization
did not filter -o-link attributes, which could be used to execute JavaScript in
Opera 12. (CVE-2013-6454)
https://bugzilla.wikimedia.org/show_bug.cgi?id=58472

* During internal review, it was discovered that MediaWiki displayed some information about deleted pages in the log API, enhanced RecentChanges, and user watchlists. (CVE-2013-6472)
https://bugzilla.wikimedia.org/show_bug.cgi?id=58699

References:
http://lists.wikimedia.org/pipermail/mediawiki-announce/2014-January/000138.html
https://bugs.gentoo.org/show_bug.cgi?id=498064

Comment 1 Ratul Gupta 2014-01-14 14:07:32 UTC
Created mediawiki119 tracking bugs for this issue:

Affects: epel-6 [bug 1052965]

Comment 2 Ratul Gupta 2014-01-15 05:47:47 UTC
This issue was addressed in Fedora 19 via the following advisory:
https://admin.fedoraproject.org/updates/FEDORA-2014-0803/mediawiki-1.21.4-1.fc19

This issue was addressed in Fedora 20 via the following advisory:
https://admin.fedoraproject.org/updates/FEDORA-2014-0861/mediawiki-1.21.4-1.fc20

This issue was addressed in epel 6 via the following advisory:
https://admin.fedoraproject.org/updates/FEDORA-EPEL-2014-0166/mediawiki119-1.19.10-1.el6