
====================================================================

                             CERT-Renater

                 Note d'Information No. 2021/VULN084
_____________________________________________________________________

DATE                : 09/02/2021

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S):  Systems running MediaWiki Extensions and Skins.

=====================================================================
https://lists.wikimedia.org/pipermail/mediawiki-announce/2020-December/000270.html
_____________________________________________________________________

Greetings-

With the security/maintenance release of MediaWiki 1.31.11/1.35.1 [0],
we would also like to provide this supplementary announcement of
MediaWiki extensions and skins with now-public Phabricator tasks,
security patches and backports [1]:

 == Cosmos Skin ==
 + (T265440, CVE-2020-27620) - Mix used of wfMessage() calls with no
output mode and Html::rawElement
 <
https://gerrit.wikimedia.org/r/q/I738471981be4b394caf65de615e8ee4ab36a9782 >

 == FileImporter ==
 + (T265810, CVE-2020-27621) - uses a WMF IP address, does not include
XFF for users using this extension
 <
https://gerrit.wikimedia.org/r/q/I24a240253c7a5c66dd493a68e8c23d95a17e1b21 >

 == RandomGameUnit ==
 + (T266400, CVE-2020-27957) - Stored XSS
 <
https://gerrit.wikimedia.org/r/q/I497d2076038f75c9eb77e0e250f2af56f5bd2bfc >

 == PollNY ==
 + (T266508, CVE-2020-29003) - Stored XSS
 <
https://gerrit.wikimedia.org/r/q/Ic5b8f579c303e9666a0b7d815230e4ce08557027 >

 = CologneBlue ==
 + (T267278, CVE-2020-29002) - XSS vulnerability
 <
https://gerrit.wikimedia.org/r/q/Ie798a4f16d0ac2a4871aefeb593d962966aeb6b0 >

 == Push ==
 + (T262724, CVE-2020-29004, CVE-2020-29005) - Push extension exposes login
credentials
 <
https://gerrit.wikimedia.org/r/q/I15d76536a6cf256417d7e28838e4cdb66245adf5 >

 == PushToWatch ==
 + (T268641, CVE-2020-35626) - classic CSRF
 <
https://gerrit.wikimedia.org/r/q/I3f41d8087af2ae22581836f7c32baac97f348044 >

 == SecurePoll ==
 + (T268794, CVE-2020-35624) - SecurePoll should not show the exact time
of cast votes publicly
 <
https://gerrit.wikimedia.org/r/q/If8e15eb8ce9ec652c06816cbff52bb084fd50e73 >

 == GlobalUsage ==
 + (T268341, CVE-2020-35622) - XSS in SpecialGlobalUsage
 <
https://gerrit.wikimedia.org/r/q/I3d4689529c976cff14c9ab218eab67d0c7b9cad6 >

 == Widgets ==
 + (T269718, CVE-2020-35625) - RCE in Widgets extension
 <
https://gerrit.wikimedia.org/r/q/Ic899a8b15bc510e61cdacb5c024af2d226a2dbeb >

 == CASAuth ==
 + (T263498, CVE-2020-35623) - Logins to MW with at least one SSO client
extension allows masquerading as another user
 < https://github.com/CWRUChielLab/CASAuth/pull/10 >

The Wikimedia Security Team recommends updating these extensions and/or
skins to the current master branch or relevant, supported release branch
[2] as soon as possible. Some of the referenced Phabricator tasks above
_may_ still be private. Unfortunately, when security issues are
reported, sometimes sensitive information is exposed and since
Phabricator is historical, we cannot make these tasks public without
exposing this sensitive information. If you have any additional
questions or concerns regarding this update, please feel free to contact
security at wikimedia.org or file a security task within Phabricator [3].

[0]
https://lists.wikimedia.org/pipermail/mediawiki-announce/2020-December/000268.html
[1] https://phabricator.wikimedia.org/T263810
[2] https://www.mediawiki.org/wiki/Version_lifecycle
[3] https://www.mediawiki.org/wiki/Reporting_security_bugs

-- 
Scott Bassett
sbassett at wikimedia.org




=========================================================
+ CERT-RENATER       |    tel : 01-53-94-20-44          +
+ 23/25 Rue Daviel   |    fax : 01-53-94-20-41          +
+ 75013 Paris        |    email:cert@support.renater.fr +
=========================================================




