Page MenuHomePhabricator

sbassett (Scott Bassett)
Staff Security EngineerAdministrator

Today

  • Clear sailing ahead.

Tomorrow

  • Clear sailing ahead.

Sunday

  • Clear sailing ahead.

User Details

User Since
Sep 12 2018, 3:52 PM (304 w, 1 d)
Roles
Administrator
Availability
Available
IRC Nick
sbassett
LDAP User
SBassett
MediaWiki User
SBassett (WMF) [ Global Accounts ]

Member of the Security-Team. My user-sbassett board should be fairly up-to-date, though we also track some other work within Asana these days.

Recent Activity

Wed, Jul 3

sbassett removed projects from T367123: Investigate minio packaging, install, security monitoring.: secscrum, RFS.
Wed, Jul 3, 5:17 PM · SecTeam-Processed, Privacy Engineering, Security Preview
sbassett moved T362563: Application Security Review Request : async-profiler (Sampling CPU and HEAP profiler for Java featuring AsyncGetCallTrace + perf_events ) from Upcoming Quarter Planning Queue to Waiting on the secscrum board.
Wed, Jul 3, 5:15 PM · Data-Platform-SRE, Discovery-Search, secscrum, Security, Application Security Reviews
sbassett moved T366634: Application Security Review Request : LimeSurvey-5-Point-Emojis extension from Upcoming Quarter Planning Queue to Waiting on the secscrum board.
Wed, Jul 3, 5:15 PM · secscrum, Security, Application Security Reviews
sbassett changed the status of T366233: Application Security Review Request : Metrics Platform extension from Open to In Progress.
Wed, Jul 3, 5:15 PM · secscrum, Security, Application Security Reviews
sbassett removed projects from T368108: Investigate Superset packaging, install, security monitoring.: secscrum, RFS.
Wed, Jul 3, 5:15 PM · SecTeam-Processed, Privacy Engineering, Security Preview
sbassett changed the status of T365525: Application Security Review Request : CommunityRequests Extension from Open to In Progress.
Wed, Jul 3, 5:15 PM · Community Wishlist Survey, Community-Tech, secscrum, Security, Application Security Reviews
sbassett removed projects from T367817: Investigate Dagster packaging, install, security monitoring.: secscrum, RFS.
Wed, Jul 3, 5:15 PM · SecTeam-Processed, Privacy Engineering, Security Preview
sbassett removed projects from T367818: Investigate Trino/Starburst install, operation and maintenance, and security monitoring.: secscrum, RFS.
Wed, Jul 3, 5:15 PM · SecTeam-Processed, Privacy Engineering, Security Preview
sbassett moved T367905: Application Security Review Request : OpenTelemetry PHP SDK from Upcoming Quarter Planning Queue to Waiting on the secscrum board.
Wed, Jul 3, 5:15 PM · MediaWiki-Vendor, secscrum, Security, Application Security Reviews
sbassett moved T362774: Application Security Review Request : service-runner replacement: @tchin/service-utils from Upcoming Quarter Planning Queue to Waiting on the secscrum board.
Wed, Jul 3, 5:15 PM · secscrum, Security, Application Security Reviews
sbassett moved T365144: Application Security Review Request : Quarto from Upcoming Quarter Planning Queue to Waiting on the secscrum board.
Wed, Jul 3, 5:15 PM · Product-Analytics, secscrum, Security, Application Security Reviews
sbassett moved T355150: Application Security Review Request : Adiutor MediaWiki extension from Upcoming Quarter Planning Queue to Waiting on the secscrum board.
Wed, Jul 3, 5:15 PM · Adiutor, secscrum, Security, Application Security Reviews
sbassett moved T355161: Application Security Review Request : PlaceNewSection extension from Upcoming Quarter Planning Queue to Waiting on the secscrum board.
Wed, Jul 3, 5:15 PM · secscrum, Security, Application Security Reviews
sbassett changed the status of T366233: Application Security Review Request : Metrics Platform extension, a subtask of T366234: Deploy the Metrics Platform extension, from Open to In Progress.
Wed, Jul 3, 5:14 PM · Patch-For-Review, Wikimedia-extension-review-queue, Wikimedia-Extension-setup
sbassett changed the status of T367995: Security Preview for shared login domain from Open to In Progress.
Wed, Jul 3, 5:13 PM · SecTeam-Processed, secscrum, SUL3, Security Preview, RFS
sbassett changed the status of T367995: Security Preview for shared login domain, a subtask of T363695: Create a Wikimedia login domain that can be served by any wiki, from Open to In Progress.
Wed, Jul 3, 5:13 PM · Security, SUL3, MediaWiki-extensions-CentralAuth, MediaWiki-Platform-Team
sbassett moved T367995: Security Preview for shared login domain from Upcoming Quarter Planning Queue to In Progress on the secscrum board.
Wed, Jul 3, 5:12 PM · SecTeam-Processed, secscrum, SUL3, Security Preview, RFS
sbassett moved T365525: Application Security Review Request : CommunityRequests Extension from Upcoming Quarter Planning Queue to In Progress on the secscrum board.
Wed, Jul 3, 5:12 PM · Community Wishlist Survey, Community-Tech, secscrum, Security, Application Security Reviews
sbassett moved T366233: Application Security Review Request : Metrics Platform extension from Upcoming Quarter Planning Queue to In Progress on the secscrum board.
Wed, Jul 3, 5:12 PM · secscrum, Security, Application Security Reviews
sbassett assigned T362774: Application Security Review Request : service-runner replacement: @tchin/service-utils to acooper.
Wed, Jul 3, 4:51 PM · secscrum, Security, Application Security Reviews
sbassett closed Restricted Task, a subtask of T331514: [Goal] M1: Metrics Platform: Control Plane: Analytics instrumentation stream management UI, as Resolved.
Wed, Jul 3, 4:18 PM · Metrics Platform Backlog
sbassett moved T365525: Application Security Review Request : CommunityRequests Extension from Back Orders to Upcoming Quarter Planning Queue on the secscrum board.
Wed, Jul 3, 3:38 PM · Community Wishlist Survey, Community-Tech, secscrum, Security, Application Security Reviews
sbassett moved T367905: Application Security Review Request : OpenTelemetry PHP SDK from Back Orders to Upcoming Quarter Planning Queue on the secscrum board.
Wed, Jul 3, 3:37 PM · MediaWiki-Vendor, secscrum, Security, Application Security Reviews
sbassett moved T355161: Application Security Review Request : PlaceNewSection extension from Back Orders to Upcoming Quarter Planning Queue on the secscrum board.
Wed, Jul 3, 3:37 PM · secscrum, Security, Application Security Reviews
sbassett closed T360365: Application Security Review Request : New Plugins for Upcoming WMF & WEND Digital Annual Reports - WordPress as Resolved.
Wed, Jul 3, 3:37 PM · secscrum, Security, Application Security Reviews

Tue, Jul 2

sbassett added a comment to T303433: Allow Stewards to enable 'emergency CAPTCHAs' for anonymous IP edits.
  • Enable a global abuse filter for showing a CAPTCHA on all projects
  • Create two local abuse filters on enwiki and jawiki

Which doesn't sound that bad. Just trying to avoid the need to build new software for this, if it can be easily solved with something we've already got.

Tue, Jul 2, 3:23 PM · MediaWiki-Platform-Team (Radar), MW-1.39-notes (1.39.0-wmf.25; 2022-08-15), Stewards-and-global-tools, MediaWiki-extensions-CentralAuth, SecTeam-Processed, Sustainability (Incident Followup), ConfirmEdit (CAPTCHA extension), Platform Engineering, Wikimedia-Site-requests, Security
sbassett added a comment to T303433: Allow Stewards to enable 'emergency CAPTCHAs' for anonymous IP edits.

I see, thanks. The example patch in the task description is enabling CAPTCHA for just one wiki. Are there circumstances where we want to set $wmgEmergencyCaptcha across all projects without involving SREs? If not, then the AbuseFilter + showcaptcha consequence seems like it would suffice for the use case described in this task.

Tue, Jul 2, 3:17 PM · MediaWiki-Platform-Team (Radar), MW-1.39-notes (1.39.0-wmf.25; 2022-08-15), Stewards-and-global-tools, MediaWiki-extensions-CentralAuth, SecTeam-Processed, Sustainability (Incident Followup), ConfirmEdit (CAPTCHA extension), Platform Engineering, Wikimedia-Site-requests, Security

Mon, Jul 1

sbassett closed T367205: Security Issue Access Request for SDeckelmann-WMF as Resolved.

Hey! I get the emails, so no relaying required :)

And, done.

Mon, Jul 1, 9:02 PM · SecTeam-Processed, Security-Team, Security
sbassett changed the status of Restricted Task, a subtask of T172065: Hunt for Toolforge tools that load resources from third party sites, from Open to In Progress.
Mon, Jul 1, 4:25 PM · Privacy Engineering, Toolforge-standards-committee, Tools, Privacy
sbassett added a comment to T367205: Security Issue Access Request for SDeckelmann-WMF.

Per Security's SOP, "Set up Two-Factor Authentication for your Phabricator account under Settings → Authentication → Multi-Factor Auth" is required.
This has not happened thus reopening this ticket.

Mon, Jul 1, 2:56 PM · SecTeam-Processed, Security-Team, Security
sbassett removed a project from T286814: '.event.pageViewId' should be string, '.event.subTest' should be string, '.event.searchSessionId' should be string: Analytics-Radar.
Mon, Jul 1, 2:54 PM · MW-1.43-notes (1.43.0-wmf.14; 2024-07-16), Discovery-Search (Current work), Wikimedia-production-error, Data-Engineering

Fri, Jun 28

sbassett added a comment to T342468: Craft more mediawiki-specific and php semgrep rule sets.

Write-up of some of this quarter's work is here: T335892#9936225

Fri, Jun 28, 9:15 PM · user-sbassett, Security-Team, GitLab-Application-Security-Pipeline
sbassett added a comment to T335892: Get stats on Gadgets and Users scripts loading third-party resources.

Hey all -

Fri, Jun 28, 9:15 PM · Patch-For-Review, WMF-General-or-Unknown, affects-Miraheze, SecTeam-Processed, Privacy Engineering, tech-decision-forum
sbassett closed T368752: Security Issue Access Request for (RoySmith), T366554 as Declined.

I've gone ahead and made T366554 public as, at worst, I think it's a low-risk issue.

Fri, Jun 28, 4:11 PM · SecTeam-Processed, Security-Team, Security
sbassett set Author Affiliation to community on T366554: Views data integrity compromised by entity running up fake views.
Fri, Jun 28, 4:11 PM · SecTeam-Processed, Data-Engineering, Pageviews-Anomaly, Security

Thu, Jun 27

sbassett awarded T20110: Define AbuseFilter consequence to display a CAPTCHA a Like token.
Thu, Jun 27, 6:28 PM · MW-1.43-notes (1.43.0-wmf.14; 2024-07-16), User-notice, ConfirmEdit (CAPTCHA extension), Wikimedia-Hackathon-2024, AbuseFilter
sbassett added a member for WMF-NDA: acooper.
Thu, Jun 27, 6:28 PM

Wed, Jun 26

sbassett added a watcher for Charts: sbassett.
Wed, Jun 26, 6:35 PM

Tue, Jun 25

sbassett added a comment to T355161: Application Security Review Request : PlaceNewSection extension.

@sbassett Hi! Are you able to check the extension next quarter?

Tue, Jun 25, 2:36 PM · secscrum, Security, Application Security Reviews

Mon, Jun 24

sbassett added a comment to T367440: Attempt to condense trivy scanning output and avoid false positive exit code.

Example of a template keeping track of cumulative bash error codes: https://gitlab.wikimedia.org/repos/security/gitlab-ci-security-templates/-/blob/7102fe1332c371f52d5e0800701d60a81a7e104c/php-security-checker/php-security-checker-ci.yml#L24-L70

Mon, Jun 24, 9:22 PM · GitLab-Application-Security-Pipeline, Security, Security Team AppSec, Security-Team
sbassett added a comment to T365644: Remote Code Execution on svgtranslate.

@Chocapikk1337 - you've now been added to our hall of fame: https://security.wikimedia.org/hall-of-fame/

Mon, Jun 24, 5:50 PM · Patch-For-Review, Community-Tech (June 3-14 2024 Arctic Fox), SecTeam-Processed, SVG Translate Tool, Vuln-Inject, Security, Security-Team
sbassett added a comment to T368224: Audit members of acl*security for more than 12 months of no activity (May 2025).

Stalled on completion date. If that's not proper, we can set the status to something else. The Security-Team also has a calendar invite set for this next year.

Mon, Jun 24, 4:17 PM · SecTeam-Processed, Security-Team, Phabricator
sbassett added a project to T368224: Audit members of acl*security for more than 12 months of no activity (May 2025): SecTeam-Processed.
Mon, Jun 24, 4:12 PM · SecTeam-Processed, Security-Team, Phabricator
sbassett moved T368224: Audit members of acl*security for more than 12 months of no activity (May 2025) from Incoming to Back Orders on the Security-Team board.
Mon, Jun 24, 4:12 PM · SecTeam-Processed, Security-Team, Phabricator
sbassett edited projects for T367995: Security Preview for shared login domain, added: SecTeam-Processed; removed Security-Team.
Mon, Jun 24, 4:11 PM · SecTeam-Processed, secscrum, SUL3, Security Preview, RFS
sbassett moved T368108: Investigate Superset packaging, install, security monitoring. from Incoming to Upcoming Quarter Planning Queue on the secscrum board.
Mon, Jun 24, 3:08 PM · SecTeam-Processed, Privacy Engineering, Security Preview
sbassett added a comment to T337305: Audit members of acl*security for more than 12 months of no activity (May 2024).

Was I caught up in this cleanup by chance @sbassett? I noticed my access seems to be gone. If so, could I be readded? I use the access for Fandom for pre-release access and checking for any crossover with our bug bounty program we run.

Mon, Jun 24, 2:26 PM · SecTeam-Processed, Security-Team, Phabricator, Security
sbassett added a member for acl*security_volunteer: Grunny.
Mon, Jun 24, 2:25 PM

Fri, Jun 21

sbassett set Author Affiliation to tech on T340189: Images of private wikis are publicly accessible if attacker knows the URL or the filename.
Fri, Jun 21, 5:06 PM · Privacy Engineering, SecTeam-Processed, Vuln-Infoleak, SRE-swift-storage, Security, Security-Team

Thu, Jun 20

sbassett closed T340189: Images of private wikis are publicly accessible if attacker knows the URL or the filename as Resolved.

Given that more than ninety days have passed since this bug got fixed, we don't have any logs of who might have accessed the private files. I suggest closing this and filing follow ups for fixing setZone and other issues?

Thu, Jun 20, 6:03 PM · Privacy Engineering, SecTeam-Processed, Vuln-Infoleak, SRE-swift-storage, Security, Security-Team
sbassett closed T361961: Security Review For reefjs (potentially used by Wikipedia Preview) as Resolved.
Thu, Jun 20, 4:59 PM · Inuka-Team, Wikipedia-Preview, secscrum, Application Security Reviews
sbassett added a comment to T364302: Start the Mitre CNA Partner Process for the Wikimedia Foundation .

Note: github.com/wikimedia is not the only place that Wikimedia codes are located - see https://www.mediawiki.org/wiki/Gerrit/GitHub#Other_GitHub_organizations. Some are semi-official, such as toolforge related repos which may be co-maintained by WMF and volunteers. There are a number of WMDE repos too which is used in production.

Thu, Jun 20, 3:52 PM · Security-Team
sbassett moved T367905: Application Security Review Request : OpenTelemetry PHP SDK from Incoming to Back Orders on the secscrum board.
Thu, Jun 20, 3:46 PM · MediaWiki-Vendor, secscrum, Security, Application Security Reviews
sbassett moved T367995: Security Preview for shared login domain from Incoming to Upcoming Quarter Planning Queue on the secscrum board.
Thu, Jun 20, 3:46 PM · SecTeam-Processed, secscrum, SUL3, Security Preview, RFS

Mon, Jun 17

sbassett closed T360070: Application Security Review Request : Extension:IPReputation, a subtask of T360067: Deploy Extension:IPReputation, as Resolved.
Mon, Jun 17, 9:59 PM · Patch-For-Review, MediaWiki-extensions-IPReputation, Wikimedia-extension-review-queue, Wikimedia-Extension-setup
sbassett closed T360070: Application Security Review Request : Extension:IPReputation as Resolved.
Mon, Jun 17, 9:58 PM · user-sbassett, MediaWiki-extensions-IPReputation, secscrum, Security, Application Security Reviews
sbassett moved T360070: Application Security Review Request : Extension:IPReputation from In Progress to Our Part Is Done on the secscrum board.
Mon, Jun 17, 9:58 PM · user-sbassett, MediaWiki-extensions-IPReputation, secscrum, Security, Application Security Reviews
sbassett added a comment to T360070: Application Security Review Request : Extension:IPReputation.

Security Review Summary - T360070 - 2024-06-17
Last commit reviewed: be78eb0148

Mon, Jun 17, 9:58 PM · user-sbassett, MediaWiki-extensions-IPReputation, secscrum, Security, Application Security Reviews
sbassett moved T367817: Investigate Dagster packaging, install, security monitoring. from Incoming to Upcoming Quarter Planning Queue on the secscrum board.
Mon, Jun 17, 9:10 PM · SecTeam-Processed, Privacy Engineering, Security Preview
sbassett moved T367818: Investigate Trino/Starburst install, operation and maintenance, and security monitoring. from Incoming to Upcoming Quarter Planning Queue on the secscrum board.
Mon, Jun 17, 9:10 PM · SecTeam-Processed, Privacy Engineering, Security Preview
sbassett added a comment to T364302: Start the Mitre CNA Partner Process for the Wikimedia Foundation .

For active, I was just meaning "not archived", per gerrit's definition.

Mon, Jun 17, 4:30 PM · Security-Team

Fri, Jun 14

sbassett added a comment to T360070: Application Security Review Request : Extension:IPReputation.

Quick update on this: I plan to post the review next Monday or Tuesday. I haven't really found anything concerning at all.

Fri, Jun 14, 9:15 PM · user-sbassett, MediaWiki-extensions-IPReputation, secscrum, Security, Application Security Reviews
sbassett added a comment to T364302: Start the Mitre CNA Partner Process for the Wikimedia Foundation .

Ok, if we can keep it simple but all-encompassing, then I'd probably go with something like: "Any active code repository hosted under gerrit.wikimedia.org, gitlab.wikimedia.org or github.com/wikimedia that is not a fork of an upstream project or otherwise unmaintained by the WMF or Wikimedia Community".

Fri, Jun 14, 9:05 PM · Security-Team
sbassett added a comment to T335892: Get stats on Gadgets and Users scripts loading third-party resources.

@sbassett, as a next step I'd probably use your idea of detecting TPR use by searching for things like import, importScript, mw.loader.load, xmlhttprequest, jquery.load, url for css, et al. Glad to hear if you think there's a cleaner way to avoid false positives.

Fri, Jun 14, 8:49 PM · Patch-For-Review, WMF-General-or-Unknown, affects-Miraheze, SecTeam-Processed, Privacy Engineering, tech-decision-forum
sbassett added a comment to T364302: Start the Mitre CNA Partner Process for the Wikimedia Foundation .

"Vulnerabilities in MediaWiki core (https://gerrit.wikimedia.org/r/admin/repos/mediawiki/core,general), skins and extensions hosted on gerrit.wikimedia.org, gitlab.wikimedia.org or github.com/wikimedia along with wikimedia microservices hosted here: https://gerrit.wikimedia.org/r/admin/repos/q/filter:mediawiki/services"

Fri, Jun 14, 4:46 PM · Security-Team
sbassett added a comment to T364302: Start the Mitre CNA Partner Process for the Wikimedia Foundation .

At the very least I think we'd also want to include MediaWiki skins (as opposed to just extensions) since WMF folks are largely the maintainers of Vector et al. Personally, I think we'd also want to include things like the various Wikimedia microservices that support some production-deployed MediaWiki extensions, etc. as we are pretty much the sole maintainers of those. Beyond that, we do write a lot of additional, proprietary Wikimedia code (SRE, Data Engineering, etc.) but we've never traditionally requested many CVEs for many of those codebases, so maybe we aren't worried about those as much. I'd also prefer to at least have the ability to issue CVEs for non-Wikimedia-deployed extensions and skins, as many of those comprise the quarterly supplemental security releases that we still manage.

Fri, Jun 14, 4:40 PM · Security-Team
sbassett added a subtask for T342177: [EPIC] Application Security Pipeline Components for Gitlab - Phase 2 Work: T367440: Attempt to condense trivy scanning output and avoid false positive exit code.
Fri, Jun 14, 4:30 PM · user-sbassett, SecTeam-Processed, Security-Team, Security, GitLab-Application-Security-Pipeline
sbassett added a parent task for T367440: Attempt to condense trivy scanning output and avoid false positive exit code: T342177: [EPIC] Application Security Pipeline Components for Gitlab - Phase 2 Work.
Fri, Jun 14, 4:30 PM · GitLab-Application-Security-Pipeline, Security, Security Team AppSec, Security-Team

Thu, Jun 13

sbassett moved T366233: Application Security Review Request : Metrics Platform extension from Back Orders to Upcoming Quarter Planning Queue on the secscrum board.
Thu, Jun 13, 6:24 PM · secscrum, Security, Application Security Reviews
sbassett updated the task description for T367440: Attempt to condense trivy scanning output and avoid false positive exit code.
Thu, Jun 13, 6:16 PM · GitLab-Application-Security-Pipeline, Security, Security Team AppSec, Security-Team
sbassett closed T364555: Application Security Review Request : ICalendar Generator as Resolved.
Thu, Jun 13, 4:24 PM · Campaign-Tools, secscrum, Security, Application Security Reviews
sbassett closed T364555: Application Security Review Request : ICalendar Generator, a subtask of T358493: Participant can add event details to external calendar via registration confirmation email, as Resolved.
Thu, Jun 13, 4:24 PM · Campaign-Tools (Campaign-Tools-Current-Sprint), CampaignEvents, Campaign-Registration
sbassett added a comment to T364555: Application Security Review Request : ICalendar Generator.

Oh, yes sorry. I can confirm it's all about that package.

Thu, Jun 13, 4:23 PM · Campaign-Tools, secscrum, Security, Application Security Reviews
sbassett created T367440: Attempt to condense trivy scanning output and avoid false positive exit code.
Thu, Jun 13, 4:09 PM · GitLab-Application-Security-Pipeline, Security, Security Team AppSec, Security-Team
sbassett added a comment to T365298: Design request: Central Login Design Review and Recommendations.

...something like https://sso.wikimedia.org/en.wikipedia.org/wiki/Special:Userlogin which is potentially confusing or suspicious...

Thu, Jun 13, 3:41 PM · SUL3, Design, Wikimedia-Design
sbassett added a comment to T364555: Application Security Review Request : ICalendar Generator.

@sbassett so are we safe to go ahead?

Thu, Jun 13, 3:33 PM · Campaign-Tools, secscrum, Security, Application Security Reviews

Wed, Jun 12

sbassett added a project to T201662: Change the MySQL passwords: SecTeam-Processed.
Wed, Jun 12, 4:16 PM · SecTeam-Processed, Security, DBA
sbassett removed a project from T201662: Change the MySQL passwords: User-Ladsgroup.
Wed, Jun 12, 4:16 PM · SecTeam-Processed, Security, DBA
sbassett set Author Affiliation to tech on T303930: Change mysql root password.
Wed, Jun 12, 4:15 PM · SecTeam-Processed, DBA, Security
sbassett moved T367123: Investigate minio packaging, install, security monitoring. from Back Orders to Upcoming Quarter Planning Queue on the secscrum board.
Wed, Jun 12, 4:12 PM · SecTeam-Processed, Privacy Engineering, Security Preview
sbassett closed T357353: Application Security Review Request : NetworkSession MediaWiki extension , a subtask of T355267: Add extension NetworkSession to all wmf wikis, as Resolved.
Wed, Jun 12, 4:10 PM · Discovery-Search (Current work), Wikimedia-extension-review-queue, Wikimedia-Extension-setup
sbassett closed T357353: Application Security Review Request : NetworkSession MediaWiki extension as Resolved.
Wed, Jun 12, 4:09 PM · NetworkSession, Discovery-Search (Current work), secscrum, Security, Application Security Reviews
sbassett moved T361956: Application Security Review Request : css-sanitizer custom property support from Waiting to Our Part Is Done on the secscrum board.
Wed, Jun 12, 4:09 PM · Web-Team-Backlog (Needs Prioritization (Tech)), user-sbassett, css-sanitizer, secscrum, Security, Application Security Reviews
sbassett closed T361956: Application Security Review Request : css-sanitizer custom property support as Resolved.
Wed, Jun 12, 4:08 PM · Web-Team-Backlog (Needs Prioritization (Tech)), user-sbassett, css-sanitizer, secscrum, Security, Application Security Reviews
sbassett moved T367123: Investigate minio packaging, install, security monitoring. from Incoming to Back Orders on the secscrum board.
Wed, Jun 12, 4:07 PM · SecTeam-Processed, Privacy Engineering, Security Preview
sbassett triaged T366983: Github MathJax unicode xss exploit as Low priority.
Wed, Jun 12, 3:44 PM · Vuln-XSS, Math, Mathoid, Security, Security-Team
sbassett closed T366983: Github MathJax unicode xss exploit as Resolved.
Wed, Jun 12, 3:43 PM · Vuln-XSS, Math, Mathoid, Security, Security-Team
sbassett added a comment to T366983: Github MathJax unicode xss exploit .

Ok, let's call this resolved then, as Wikimedia wikis are unaffected. I guess the only thing we'd need to worry about is if mathoid-mathjax ever updates the version of mathjax from which they are forked (assuming this only affects mathjax v3) and texvcjs ever becomes more lax in the commands/functions it allows.

Wed, Jun 12, 3:43 PM · Vuln-XSS, Math, Mathoid, Security, Security-Team
sbassett added a comment to T367205: Security Issue Access Request for SDeckelmann-WMF.

Interesting - they were added to WMF-NDA, but none of the acl*security groups. I've gone ahead and added them to acl*security_management, so they should be able to see all current security issues tracked in Phab (some of these are public if they're low-risk, etc.)

Wed, Jun 12, 3:30 PM · SecTeam-Processed, Security-Team, Security
sbassett closed T367205: Security Issue Access Request for SDeckelmann-WMF as Resolved.
Wed, Jun 12, 3:29 PM · SecTeam-Processed, Security-Team, Security
sbassett added a member for acl*security_management: SDeckelmann-WMF.
Wed, Jun 12, 3:19 PM
sbassett added a comment to T201662: Change the MySQL passwords.

Any concerns, @Marostegui? If not, happy to make these tasks public now.

Wed, Jun 12, 3:16 PM · SecTeam-Processed, Security, DBA
sbassett reopened T366983: Github MathJax unicode xss exploit as "In Progress".
Wed, Jun 12, 3:16 PM · Vuln-XSS, Math, Mathoid, Security, Security-Team
sbassett added a comment to T366983: Github MathJax unicode xss exploit .

So CVE-2023-39663 looks like it refers to two regular expression DoS vectors. It looks like this issue might be tracked within these two issues:

  1. https://github.com/mathjax/MathJax/issues/3129 (original)
  2. https://github.com/mathjax/MathJax/issues/3241 (duplicate)

There is a work-around posted under the first issue (safe mode) but I'm not seeing a CVE. A commenter also noted that this issue is fixed within v4, but that version is still in beta. So we might want to explore the safe mode config for v3, if we don't currently have that enabled.

Wed, Jun 12, 3:16 PM · Vuln-XSS, Math, Mathoid, Security, Security-Team
sbassett changed the visibility for T365644: Remote Code Execution on svgtranslate.
Wed, Jun 12, 3:09 PM · Patch-For-Review, Community-Tech (June 3-14 2024 Arctic Fox), SecTeam-Processed, SVG Translate Tool, Vuln-Inject, Security, Security-Team
sbassett raised the priority of T366983: Github MathJax unicode xss exploit from Low to Needs Triage.
Wed, Jun 12, 3:09 PM · Vuln-XSS, Math, Mathoid, Security, Security-Team
sbassett triaged T366983: Github MathJax unicode xss exploit as Low priority.
Wed, Jun 12, 3:08 PM · Vuln-XSS, Math, Mathoid, Security, Security-Team
sbassett closed T365644: Remote Code Execution on svgtranslate as Resolved.

I received approval from WMF-Legal to make this public and for @Chocapikk1337 to write a public blog post (or whatever) about this issue. Also, @Chocapikk1337, let us know if you'd like to be added to the Wikimedia security hall of fame.

Wed, Jun 12, 3:08 PM · Patch-For-Review, Community-Tech (June 3-14 2024 Arctic Fox), SecTeam-Processed, SVG Translate Tool, Vuln-Inject, Security, Security-Team

Jun 10 2024

sbassett triaged T366824: Add a changelog and apply a custom version number to our patched bundled Lua binaries as Medium priority.
Jun 10 2024, 5:39 PM · SecTeam-Processed, Scribunto, Security, Security-Team
sbassett moved T366824: Add a changelog and apply a custom version number to our patched bundled Lua binaries from Incoming to Watching on the Security-Team board.

Looks like @Reedy and @tstarling answered your questions, @MarkAHershberger? Did you need anything else right now or can we resolve this?

Jun 10 2024, 4:50 PM · SecTeam-Processed, Scribunto, Security, Security-Team