r44568 MediaWiki - Code Review archive

Repository:MediaWiki
Revision:r44567‎ | r44568 | r44569 >
Date:07:50, 14 December 2008
Author:tstarling
Status:ok
Tags:
Comment:
* Less euphemistic release notes. Aiming for December 15 release.
* Added text/scriptlet to MIME type blacklist as in trunk.
Modified paths:
  • /branches/REL1_13/phase3/RELEASE-NOTES (modified) (history)
  • /branches/REL1_13/phase3/includes/DefaultSettings.php (modified) (history)

Diff [purge]

Index: branches/REL1_13/phase3/includes/DefaultSettings.php
@@ -1794,6 +1794,8 @@
17951795 'application/x-php', 'text/x-php',
17961796 # Other types that may be interpreted by some servers
17971797 'text/x-python', 'text/x-perl', 'text/x-bash', 'text/x-sh', 'text/x-csh',
 1798+ # Client-side hazards on Internet Explorer
 1799+ 'text/scriptlet', 'application/x-msdownload',
17981800 # Windows metafile, client-side vulnerability on some systems
17991801 'application/x-msmetafile'
18001802 );
Index: branches/REL1_13/phase3/RELEASE-NOTES
@@ -5,7 +5,7 @@
66
77 == MediaWiki 1.13.3 ==
88
9 -November 18, 2008
 9+December 15, 2008
1010
1111 This is a security and bugfix release of the Summer 2008 snapshot release of
1212 MediaWiki.
@@ -23,15 +23,24 @@
2424
2525 == Changes since 1.13.2 ==
2626
27 -* Safer handling of non-MediaWiki exceptions -- now obeys our settings for formatting and path exposure. (Rem1)
28 -* Less verbose errors from profileinfo.php when not configured (Rem8)
29 -* Blacklist redirects via Special:Filepath, hard to use. (Rem7)
30 -* Improved input validation on Special:Import form (Rem10, Rem11)
31 -* Add a .htaccess to deleted images directory for additional protection against exposure of deleted files with known SHA-1 hashes on default installations. (Rem13)
32 -* Improved scripting safety heuristics for IE content-type detection. (Rem14)
33 -* Improved scripting safety heuristics on SVG uploads. (Rem2, Rem3, Rem5, Rem6)
34 -* Improved the security of file streaming (Special:Undelete, img_auth.php and thumb.php): use the extension to determine the type, check it against the blacklist. (Rem12.2)
35 -* Restrict img_auth.php to private wikis only. Require a session token before streaming out Special:Undelete. If uploads are hosted on a different domain, then these changes reduce the chance that an upload containing a script might steal cookies from the wiki. (Rem12.1)
 27+* Fixed XSS vulnerability in api.php. (Rem1)
 28+* Avoid fatal error in profileinfo.php when not configured. (Rem8)
 29+* Fixed CSRF vulnerability in Special:Import. (Rem10, Rem11)
 30+* Add a .htaccess to deleted images directory for additional protection against
 31+ exposure of deleted files with known SHA-1 hashes on default installations.
 32+ (Rem13)
 33+* Fixed XSS vulnerability for Internet Explorer clients, via file uploads which
 34+ are interpreted by IE as HTML. (Rem14)
 35+* Fixed XSS vulnerability for clients with SVG scripting, on wikis where SVG
 36+ uploads are enabled. Firefox 1.5+ is affected. (Rem2, Rem3, Rem5, Rem6)
 37+* Avoid streaming uploaded files to the user via index.php. This allows
 38+ security-conscious users to serve uploaded files via a different domain, and
 39+ thus client-side scripts executed from that domain cannot access the login
 40+ cookies. Affects Special:Undelete, img_auth.php and thumb.php. (Rem12)
 41+* When streaming files via index.php, use the MIME type detected from the
 42+ file extension, not from the data. This reduces the XSS attack surface.
 43+* Blacklist redirects via Special:Filepath. Such redirects exacerbate any
 44+ XSS vulnerabilities involving uploads of files containing scripts. (Rem7)
3645
3746 == Changes since 1.13.1 ==
3847

Status & tagging log