MediaWiki 1.23.10
10 August 2015
MediaWiki version 1.23.10 is now available (security release).
Upgrading to MediaWiki 1.23.10
MediaWiki 1.23.10 can be upgraded to (or installed) using any of Installatron's products. Use Installatron's optional Automatic Update feature to automatically apply MediaWiki updates as new versions are released, or use Installatron's Clone feature to duplicate an existing MediaWiki install to test the 1.23.10 upgrade prior to applying it live. Get started managing your MediaWiki installations with Installatron
What's New in MediaWiki 1.23.10
This release fixes three security issues in the core, in addition to other bug fixes. Several extensions have also had security issues fixed.
Security fixes
- Internal review discovered that Special:DeletedContributions did not properly protect the IP of autoblocked users. This fix makes the functionality of Special:DeletedContributions consistent with Special:Contributions and Special:BlockList. (T106893)
- Internal review discovered that watchlist anti-csrf tokens were not being compared in constant time, which could allow various timing attacks. This could allow an attacker to modify a user's watchlist via csrf. (T94116)
- John Menerick reported that MediaWiki's thumb.php failed to sanitize various error messages, resulting in xss. #T97391
- Extension:SemanticForms - MediaWiki user Grunny discovered multiple reflected xss vectors in SemanticForms. Further internal review discovered and fixed other reflected and stored xss vectors. (T103391, T103765, T103761)
- Extension:SyntaxHighlight_GeSHi - xss and potential DoS vectors. Internal review discovered that the contib directory for GeSHi was re-included in MediaWiki 1.25. Some scripts could be potentially be used for DoS, and DAU Huy Ngoc discovered an xss vector. All contrib scripts have been removed. (T108198)
- Extension:TimedMediaHandler - User:McZusatz reported that resetting transcodes deleted the transcode without creating a new one, which could be used for vandalism or potentially DoS. (T100211)
- Extension:Quiz - Internal review discovered that Quiz did not properly escape regex metacharacters in a user controlled regular expression, enabling a DoS vector. #T97083
- Extension:Widgets - MediaWiki developer Majr reported a potential HTML injection (xss) vector. (T88964)
Bugfixes
- (bug 67644) Make AutoLoaderTest handle namespaces
- (T91653) Minimal PSR-3 debug logger to support backports from 1.25+.
- (T102562) Fix InstantCommons parameters to handle the new HTTPS-only policy of Wikimedia Commons.