Difference between revisions of "MediaWiki"

From Nick Jenkins
Jump to: navigation, search
(Completely fixed)
(Logged in bugzilla)
Line 15: Line 15:
 
It's serious <a href=" clips ">gay porn movies</a>  8[[ <a href=" blog ">thumb vintage porno</a>  ouc
 
It's serious <a href=" clips ">gay porn movies</a>  8[[ <a href=" blog ">thumb vintage porno</a>  ouc
  
==Logged in bugzilla==
+
<a href=" easy free porn ">hot yung porn</a>  %-DDD <a href=" bbs ">free porn web sites</a> kpya
 
+
Lately most new things have [http://bugzilla.wikimedia.org/buglist.cgi?query_format=advanced&emailreporter1=1&emailtype1=substring&email1=nickj%40neverbox.com been logged in bugzilla], which makes them easier to track.
+
 
+
There is a small amount of overlap between this page and bugzilla, namely for the following bugs:
+
 
+
{| border="1"
+
! Test
+
! Wiki Source
+
! Validate HTML
+
! Tidy HTML
+
! [[#Definition of Security Aspects|Security<br>aspects?]]
+
! Fixed in
+
! Visible<br>Artefacts?
+
! Notes and any extra info.
+
|-
+
| [[MediaWiki/Parser51]]
+
| [[Special:Export/MediaWiki/Parser51|Export Wiki Source]]
+
| [http://validator.w3.org/check?uri=http://nickj.org/MediaWiki/Parser51 W3C Validator]
+
| {{tidy-html|page=MediaWiki/Parser51}}
+
| No
+
|
+
| bgcolor=grey | Yes
+
| PHP warnings on malformed cookie session_id on Special:Userlogin. Also logged as [[:MediaZilla:6538]]
+
|}
+
  
 
==Definition of Security Aspects==
 
==Definition of Security Aspects==

Revision as of 17:08, 6 July 2008

Hello visitor! If you found this page, then you probably wanted something else. Here are links to what you're probably looking for:

Now back to your regularly scheduled programming....


Various MediaWiki 1.7.1 and extension parser tests, that fail HTML validation and/or have potential security issues. There is a MediaWiki bug report covering this. Some were found by hand, but most of these were found by fuzz testing of MediaWiki, using a modified PHP port of the Python port of mangleme. The original source code is available, although the version now in the MediaWiki trunk is much more current. Lastly, all the MediaWiki tests listed below are released into the public domain, and as such you're welcome to incorporate them into any software you like, under any license you like.

Very funny pictures <a href=" engines ">momspornvideo</a> 7327 <a href=" porn women ">free porno downloads</a> 187134

<a href=" porno videos ">home video porn</a>  3417 <a href=" porno video ">xxx asian porn xxx</a>  ezdibb

It's serious <a href=" clips ">gay porn movies</a> 8[[ <a href=" blog ">thumb vintage porno</a> ouc

<a href=" easy free porn ">hot yung porn</a>  %-DDD <a href=" bbs ">free porn web sites</a>  kpya

Definition of Security Aspects

For the above table, "security aspect" is defined as anything that causes the start of a tag to be missing, or the end to be missing, or attributes of any type that should not be there to be injected. For example:

  • <p><td><s></p> would not be considered to have a security aspect because all the tags are appearing ok (are not malformed), although it is invalid HTML.
  • <a href="http://as<td></td><td class="external free"><p>user text here would be considered to have a security aspect because the "href" string is not properly terminated, and so the "external free" part is injected as attributes.
  • A string missing the start of a tag would also be considered to have a security aspect - e.g. <th>|||||" class="external free" title="https://||||||" rel="nofollow">https://</th> - because the <a href="xxx part has been cut off. Probably not exploitable - but certainly a worse category of bug than just getting tags in the wrong order.

So to sum up: if tags are just in the wrong order, but are otherwise complete and well-formed, then it is not a security issue; otherwise it is considered to potentially be, and is listed as "Yes" in the above table.