Bug 1448108 (CVE-2017-0372)

Summary: CVE-2017-0372 mediawiki: SyntaxHighlight extension allows injection of arbitrary Pygments options
Product: [Other] Security Response Reporter: Andrej Nemec <anemec>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED UPSTREAM QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: ian, mike, puiterwijk
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: mediawiki 1.28.2, mediawiki 1.27.3 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-06-08 03:11:59 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1448110, 1448111, 1448112    
Bug Blocks:    

Description Andrej Nemec 2017-05-04 14:36:10 UTC
A vulnerability was found in the SyntaxHighlight MediaWiki extension.
Using this vulnerability it is possible for an anonymous attacker to
pass arbitrary options to the Pygments library. By specifying specially
crafted options, it is possible for an attacker to trigger a (stored)
Cross-Site Scripting condition. In addition, it allows the creating of
arbitrary files containing user-controllable data. Depending on the
server configuration, this can be used by an anonymous attacker to
execute arbitrary PHP code.

Upstream bug:

https://phabricator.wikimedia.org/T158689

References:

https://lists.wikimedia.org/pipermail/mediawiki-announce/2017-April/000209.html
http://seclists.org/fulldisclosure/2017/Apr/109

Comment 1 Andrej Nemec 2017-05-04 14:36:55 UTC
Created mediawiki tracking bugs for this issue:

Affects: fedora-all [bug 1448111]


Created mediawiki119 tracking bugs for this issue:

Affects: epel-6 [bug 1448110]


Created mediawiki123 tracking bugs for this issue:

Affects: epel-7 [bug 1448112]

Comment 2 Product Security DevOps Team 2019-06-08 03:11:59 UTC
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.