MediaWiki 1.25.2
10 August 2015
MediaWiki version 1.25.2 is now available (security release).
Upgrading to MediaWiki 1.25.2
MediaWiki 1.25.2 can be upgraded to (or installed) using any of Installatron's products. Use Installatron's optional Automatic Update feature to automatically apply MediaWiki updates as new versions are released, or use Installatron's Clone feature to duplicate an existing MediaWiki install to test the 1.25.2 upgrade prior to applying it live. Get started managing your MediaWiki installations with Installatron
What's New in MediaWiki 1.25.2
This release fixes three security issues in the core, in addition to other bug fixes. Several extensions have also had security issues fixed.
Security fixes
- Internal review discovered that Special:DeletedContributions did not properly protect the IP of autoblocked users. This fix makes the functionality of Special:DeletedContributions consistent with Special:Contributions and Special:BlockList. (T106893)
- Internal review discovered that watchlist anti-csrf tokens were not being compared in constant time, which could allow various timing attacks. This could allow an attacker to modify a user's watchlist via csrf. (T94116)
- John Menerick reported that MediaWiki's thumb.php failed to sanitize various error messages, resulting in xss. #T97391
- Extension:SemanticForms - MediaWiki user Grunny discovered multiple reflected xss vectors in SemanticForms. Further internal review discovered and fixed other reflected and stored xss vectors. (T103391, T103765, T103761)
- Extension:SyntaxHighlight_GeSHi - xss and potential DoS vectors. Internal review discovered that the contib directory for GeSHi was re-included in MediaWiki 1.25. Some scripts could be potentially be used for DoS, and DAU Huy Ngoc discovered an xss vector. All contrib scripts have been removed. (T108198)
- Extension:TimedMediaHandler - User:McZusatz reported that resetting transcodes deleted the transcode without creating a new one, which could be used for vandalism or potentially DoS. (T100211)
- Extension:Quiz - Internal review discovered that Quiz did not properly escape regex metacharacters in a user controlled regular expression, enabling a DoS vector. #T97083
- Extension:Widgets - MediaWiki developer Majr reported a potential HTML injection (xss) vector. (T88964)
Bugfixes
- Fix InstantCommons parameters to handle the new HTTPS-only policy of Wikimedia Commons. (T102562)
- Setting a configuration setting for skin or extension to false in LocalSettings.php was not working. (T100767)
- API action=opensearch json output no longer breaks when $wgDebugToolbar is enabled. (T100635)
- Using an extension.json or skin.json file which has a "manifest_version" property for 1.26 compatability will no longer trigger warnings. (T102522)
- Running updateSearchIndex.php will not throw an error as page_restrictions has been added to the locked table list. (T86156)
- Special:Version would throw notices if using SVN due to an incorrectly named variable. Add an additional check that an index is defined.