https://bugzilla.wikimedia.org/show_bug.cgi?id=25793

           Summary: Security problem: API allows to hijack sessionid
           Product: MediaWiki
           Version: wikimedia-deployment
          Platform: All
        OS/Version: All
            Status: NEW
          Keywords: patch
          Severity: major
          Priority: Normal
         Component: API
        AssignedTo: [email protected]
        ReportedBy: [email protected]
                CC: [email protected], [email protected],
                    [email protected], [email protected]


Created attachment 7791
  --> https://bugzilla.wikimedia.org/attachment.cgi?id=7791
patch fixes mentioned issue

If you make a post to api.php with something like
"action=login&lgname=TestUser&lgpassword=gotcha" the api responds with a
NeedToken error, inside the error message the current session is included... so
you can trick the api into telling you what the sessionid is to bypass httponly
and get access to the user's login session.

On wiki farm (like Wikia) an evil admin could alter common.js to run this POST
request via AJAX for every logged in user that enters his wiki - having
sessions he would be able to log in as any visitor of his wiki by creating
proper cookie.

Simple patch attached - for case LoginForm::NEED_TOKEN do not return sessionid.

-- 
Configure bugmail: https://bugzilla.wikimedia.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.

_______________________________________________
Wikibugs-l mailing list
[email protected]
https://lists.wikimedia.org/mailman/listinfo/wikibugs-l

Reply via email to