http://nickj.org/api.php?action=feedcontributions&user=212.116.219.160&feedformat=atomNick Jenkins - User contributions [en]2024-03-28T14:26:57ZUser contributionsMediaWiki 1.22.6http://nickj.org/MediaWikiMediaWiki2008-09-09T01:46:59Z<p>212.116.219.160: /* Completely fixed */</p>
<hr />
<div>Hello visitor! If you found this page, then you probably wanted something else. Here are links to what you're probably looking for:<br />
* Do you want information about a specific MediaWiki extension? Try [http://www.mediawiki.org/wiki/Extension_Matrix the table here] or [http://www.mediawiki.org/w/index.php?title=Category:All_extensions the multi-page list here], to help find the homepage for that extension.<br />
* Do you want information about MediaWiki itself? Try [http://www.mediawiki.org/ the website] for documentation, the [http://www.mediawiki.org/wiki/MediaWiki_on_IRC IRC channel] for quick questions, [http://www.mediawiki.org/wiki/Mailing_lists a mailing list] for more detailed questions, or the [http://en.wikipedia.org/wiki/MediaWiki MediaWiki Wikipedia article] for a timeline of past releases.<br />
* Do you want to hire MediaWiki developers or consultants? See [http://wikihr.net/MediaWiki the WikiHR site].<br />
<br />
Now back to your regularly scheduled programming....<br />
------<br />
<br />
Various MediaWiki 1.7.1 and extension parser tests, that fail HTML validation <s>and/or have potential security issues</s>. There is a [[:MediaZilla:5066|MediaWiki bug report]] covering this. Some were found by hand, but most of these were found by [http://www.cs.wisc.edu/~bart/fuzz/fuzz.html fuzz testing] of MediaWiki, using a modified PHP port of [http://www.securiteam.com/tools/6Z00N1PBFK.html the Python port] of [http://www.securityfocus.com/archive/1/378632/2004-10-15/2004-10-21/0 mangleme]. The [http://files.nickj.org/MediaWiki/wiki-mangleme.phps original source code is available], although the [http://svn.wikimedia.org/viewvc/mediawiki/trunk/phase3/maintenance/fuzz-tester.php version now in the MediaWiki trunk] is much more current. Lastly, all the MediaWiki tests listed below are released into the public domain, and as such you're welcome to incorporate them into any software you like, under any license you like.<br />
<br />
grererret<br />
<br />
I love this site <a href=" http://community.vh1.com/Post/Airline-Tickets-For-Military-Families/053DF8A01018ADF530008009FB2DA ">airline tickets for military families</a> thpm<br />
<br />
good material thanks <a href=" http://community.vh1.com/Post/Airline-Ticket-Wanted/078DD8A01018ADD780008009FC1CB ">cheap air flights discounted air line travel</a> :-] <a href=" http://community.vh1.com/Post/Airline-Ticketing/078DD8A01018ADD780008009FC1D1 ">cheap airlines tickets</a> foy<br />
<br />
==Logged in bugzilla==<br />
<br />
Lately most new things have [http://bugzilla.wikimedia.org/buglist.cgi?query_format=advanced&emailreporter1=1&emailtype1=substring&email1=nickj%40neverbox.com been logged in bugzilla], which makes them easier to track.<br />
<br />
There is a small amount of overlap between this page and bugzilla, namely for the following bugs:<br />
<br />
{| border="1"<br />
! Test<br />
! Wiki Source<br />
! Validate HTML<br />
! Tidy HTML<br />
! [[#Definition of Security Aspects|Security<br>aspects?]]<br />
! Fixed in<br />
! Visible<br>Artefacts?<br />
! Notes and any extra info.<br />
|-<br />
| [[MediaWiki/Parser51]]<br />
| [[Special:Export/MediaWiki/Parser51|Export Wiki Source]]<br />
| [http://validator.w3.org/check?uri=http://nickj.org/MediaWiki/Parser51 W3C Validator]<br />
| {{tidy-html|page=MediaWiki/Parser51}}<br />
| No<br />
|<br />
| bgcolor=grey | Yes<br />
| PHP warnings on malformed cookie session_id on Special:Userlogin. Also logged as [[:MediaZilla:6538]]<br />
|}<br />
<br />
==Definition of Security Aspects==<br />
<br />
For the above table, "security aspect" is defined as anything that causes the start of a tag to be missing, or the end to be missing, or attributes of any type that should not be there to be injected. For example:<br />
* ''&lt;p&gt;&lt;td&gt;&lt;s&gt;&lt;/p&gt;'' would '''not''' be considered to have a security aspect because all the tags are appearing ok (are not malformed), although it is invalid HTML.<br />
* ''<nowiki>&lt;a href="http://as&lt;td&gt;&lt;/td&gt;&lt;td class="external free"&gt;&lt;p&gt;user text here</nowiki>'' would be considered to have a security aspect because the "href" string is not properly terminated, and so the "external free" part is injected as attributes.<br />
* A string missing the start of a tag would also be considered to have a security aspect - e.g. ''<nowiki>&lt;th&gt;|||||" class="external free" title="https://||||||" rel="nofollow"&gt;https://&lt;/th&gt;</nowiki>'' - because the ''&lt;a href="xxx'' part has been cut off. Probably not exploitable - but certainly a worse category of bug than just getting tags in the wrong order.<br />
So to sum up: if tags are just in the wrong order, but are otherwise complete and well-formed, then it is not a security issue; otherwise it is considered to potentially be, and is listed as "Yes" in the above table.</div>212.116.219.160