Page MenuHomePhabricator

Mstyles (Maryum)
User

Today

  • Clear sailing ahead.

Tomorrow

  • Clear sailing ahead.

Sunday

  • Clear sailing ahead.

User Details

User Since
Nov 18 2019, 7:30 PM (295 w, 3 d)
Availability
Available
LDAP User
Mstyles
MediaWiki User
MStyles (WMF) [ Global Accounts ]

Recent Activity

Wed, Jul 16

Mstyles added a comment to T399665: Restrict WebAuthn to hardware security keys only.

It doesn't have to be a physical device, but we're proposing to currently limit passkeys to physical devices until we get proper Web Authn support

Wed, Jul 16, 7:30 PM · FY2025-26 WE4.6.3 Global 2FA Opt-In
Mstyles created T399743: Zendesk Spreadsheets Automation.
Wed, Jul 16, 5:16 PM · FY2025-26 WE4.6.1 Support Desk Streamlining
Mstyles added a comment to T399664: Expand 2FA Opt-In Privileges.

What is the benefit of adding the right directly vs adding users to a group?

Wed, Jul 16, 5:15 PM · FY2025-26 WE4.6.3 Global 2FA Opt-In
Mstyles created T399742: Integrated on-page form for EmailAuth recovery requests.
Wed, Jul 16, 5:12 PM · FY2025-26 WE4.6.1 Support Desk Streamlining
Mstyles added a comment to T399664: Expand 2FA Opt-In Privileges.

Not sure how to make that more clear. If a randomly selected user (part of whatever percent rollout we are doing) is not a member of any of the other global groups then they get added to the oathauth-tester group.

Wed, Jul 16, 5:05 PM · FY2025-26 WE4.6.3 Global 2FA Opt-In
Mstyles added a comment to T399665: Restrict WebAuthn to hardware security keys only.

Ideally we will also be able to prevent users from enabling passkeys unless they are using a physical device.

Any particular reason?

Wed, Jul 16, 4:49 PM · FY2025-26 WE4.6.3 Global 2FA Opt-In
Mstyles updated subscribers of T399666: Tracking 2FA usage.

@kostajh mentioned that we could also consider an event logging collection since there is a low volume of events

Wed, Jul 16, 3:57 PM · FY2025-26 WE4.6.3 Global 2FA Opt-In

Tue, Jul 15

Mstyles added a member for FY2025-26 WE4.6.1 Support Desk Streamlining: jrbs.
Tue, Jul 15, 11:40 PM
Mstyles added members for FY2025-26 WE4.6.1 Support Desk Streamlining: mmartorana, JAbrams.
Tue, Jul 15, 11:39 PM
Mstyles added members for FY2025-26 WE4.6.2 Multiple Authenticators: sbassett, Jly, Catrope.
Tue, Jul 15, 11:38 PM
Mstyles added a member for FY2025-26 WE4.6.2 Multiple Authenticators: Mstyles.
Tue, Jul 15, 11:37 PM
Mstyles added a member for FY2025-26 WE4.6.3 Global 2FA Opt-In: Mstyles.
Tue, Jul 15, 11:37 PM
Mstyles added members for FY2025-26 WE4.6.3 Global 2FA Opt-In: Catrope, EMill-WMF.
Tue, Jul 15, 11:37 PM
Mstyles created T399666: Tracking 2FA usage.
Tue, Jul 15, 11:36 PM · FY2025-26 WE4.6.3 Global 2FA Opt-In
Mstyles created T399665: Restrict WebAuthn to hardware security keys only.
Tue, Jul 15, 11:32 PM · FY2025-26 WE4.6.3 Global 2FA Opt-In
Mstyles created T399664: Expand 2FA Opt-In Privileges.
Tue, Jul 15, 11:28 PM · FY2025-26 WE4.6.3 Global 2FA Opt-In
Mstyles added a comment to T399614: Create a Phabricator project for WE 4.6 (Account Security).

Actually can you create them as milestones and not subprojects?

Tue, Jul 15, 5:34 PM · Project-Admins, user-sbassett
Mstyles reopened T399614: Create a Phabricator project for WE 4.6 (Account Security) as "Open".

Can you also create the following subprojects:

Tue, Jul 15, 5:31 PM · Project-Admins, user-sbassett

Wed, Jul 9

Mstyles added a comment to T398648: Consolidate docs on contributing / writing / deploying security patches.

I ended up keeping both pages since https://www.mediawiki.org/wiki/Developing_security_patches talks about more than just Gerrit. I still left the technical patch documentation in https://wikitech.wikimedia.org/wiki/How_to_deploy_code#Security_patches. Definitely open to feedback about further changes.

Wed, Jul 9, 10:54 PM · SecTeam-Processed, Security, Tech-Docs-Team, Documentation, Security-Team

Mon, Jul 7

Mstyles moved T398648: Consolidate docs on contributing / writing / deploying security patches from Incoming to In Progress on the Security-Team board.
Mon, Jul 7, 4:39 PM · SecTeam-Processed, Security, Tech-Docs-Team, Documentation, Security-Team
Mstyles moved T385403: Wrong E-Mail address composition for usernames with a comma in it "Doe, John" (observed today in MW 1.41.0) from In Progress to Our Part Is Done on the Security-Team board.
Mon, Jul 7, 4:17 PM · MediaWiki-Engineering, Vuln-Misconfiguration, MediaWiki-Email, Security, Security-Team
Mstyles closed T385403: Wrong E-Mail address composition for usernames with a comma in it "Doe, John" (observed today in MW 1.41.0) as Invalid.

Marking as invalid since we were not able to reproduce this issue on our side. Feel free to reopen @Wikinaut if you still see any issues.

Mon, Jul 7, 4:17 PM · MediaWiki-Engineering, Vuln-Misconfiguration, MediaWiki-Email, Security, Security-Team

Tue, Jul 1

Mstyles closed T397962: Security Issue Access Request for sgrabarczuk as Resolved.

Security issue access granted!

Tue, Jul 1, 8:59 PM · SecTeam-Processed, Security-Team, Security
Mstyles added a member for acl*security_documentation: sgrabarczuk.
Tue, Jul 1, 8:59 PM
Mstyles added a member for Security: sgrabarczuk.
Tue, Jul 1, 8:58 PM
Mstyles moved T397962: Security Issue Access Request for sgrabarczuk from Incoming to In Progress on the Security-Team board.
Tue, Jul 1, 3:54 PM · SecTeam-Processed, Security-Team, Security

Tue, Jun 24

Mstyles moved T385337: Security review for python package dbt-metabase from In Progress to Our Part Is Done on the secscrum board.
Tue, Jun 24, 8:38 PM · secscrum, FR-Tech-Analytics, Privacy Engineering, Security Preview, fundraising-tech-ops

Mon, Jun 23

Mstyles added a comment to T385337: Security review for python package dbt-metabase.

@Dwisehaupt if you have any questions, please let me know. Otherwise, I will mark this as resolved at the end of this week.

Mon, Jun 23, 10:27 PM · secscrum, FR-Tech-Analytics, Privacy Engineering, Security Preview, fundraising-tech-ops
Mstyles added a comment to T385337: Security review for python package dbt-metabase.

Security Review Summary - T385337 - 2025-06-23

Mon, Jun 23, 10:26 PM · secscrum, FR-Tech-Analytics, Privacy Engineering, Security Preview, fundraising-tech-ops
Mstyles moved T397524: CVE-2025-53501: Scribunto title.getContent() doesn't respect $wgNonincludableNamespaces from Incoming to In Progress on the Security-Team board.
Mon, Jun 23, 9:45 PM · Vuln-Infoleak, MediaWiki-extensions-Lockdown, Scribunto, Security, Security-Team
Mstyles added a comment to T397524: CVE-2025-53501: Scribunto title.getContent() doesn't respect $wgNonincludableNamespaces.

@Lakejason0, Thank you for working on this issue. In the future can you put patches up privately as outlined in developing security patches. It would be ideal to get this patch merged today.

Mon, Jun 23, 4:44 PM · Vuln-Infoleak, MediaWiki-extensions-Lockdown, Scribunto, Security, Security-Team
Mstyles closed T367677: CVE-2020-28496 affecting 3D extension (ReDoS) as Resolved.

Since this release is backported to 1.41 and 1.42 and there's been no response about the 1.39 patch for some time, I'm going to mark this ticket as resolved.

Mon, Jun 23, 4:41 PM · Structured-Data-Backlog, Patch-For-Review, SecTeam-Processed, 3D, Security, Security-Team
Mstyles added a comment to T385403: Wrong E-Mail address composition for usernames with a comma in it "Doe, John" (observed today in MW 1.41.0).

@Wikinaut can you verify the reproduction steps that @Jly posted?

Mon, Jun 23, 4:18 PM · MediaWiki-Engineering, Vuln-Misconfiguration, MediaWiki-Email, Security, Security-Team

Jun 16 2025

Mstyles closed T396466: Security Issue Access Request for Machine Learning team as Resolved.

The ML team now has security issue access!

Jun 16 2025, 10:34 PM · SecTeam-Processed, Machine-Learning-Team, Security-Team, Security
Mstyles added members for Security: OKarakaya-WMF, gkyziridis, BWojtowicz-WMF, achou, kevinbazira, isarantopoulos, SSalgaonkar-WMF.
Jun 16 2025, 10:33 PM
Mstyles added members for acl*security_ml_team: OKarakaya-WMF, gkyziridis, BWojtowicz-WMF, achou, kevinbazira, isarantopoulos, SSalgaonkar-WMF.
Jun 16 2025, 10:30 PM
Mstyles changed the edit policy for acl*security_ml_team.
Jun 16 2025, 10:28 PM
Mstyles closed T397069: Reset Phabricator MFA of Mstyles as Resolved.

Thank you so much @brennen!

Jun 16 2025, 10:05 PM · GitLab (Infrastructure), Release-Engineering-Team, Phabricator
Mstyles added a comment to T397069: Reset Phabricator MFA of Mstyles.

I assigned it to you @Aklapper because it looked like you did this in other situations such as T331170. I'll follow up with my team to find out if anyone has CLI access

Jun 16 2025, 6:39 PM · GitLab (Infrastructure), Release-Engineering-Team, Phabricator
Mstyles moved T396466: Security Issue Access Request for Machine Learning team from Incoming to In Progress on the Security-Team board.
Jun 16 2025, 4:23 PM · SecTeam-Processed, Machine-Learning-Team, Security-Team, Security
Mstyles created T397069: Reset Phabricator MFA of Mstyles.
Jun 16 2025, 4:14 PM · GitLab (Infrastructure), Release-Engineering-Team, Phabricator
Mstyles added a comment to T385403: Wrong E-Mail address composition for usernames with a comma in it "Doe, John" (observed today in MW 1.41.0).

@Wikinaut We did not try to reproduce in the version that you reported it in, just in 1.44.0. I'll find out if we can reproduce in 1.41.0

Jun 16 2025, 4:10 PM · MediaWiki-Engineering, Vuln-Misconfiguration, MediaWiki-Email, Security, Security-Team

Jun 10 2025

Mstyles added a member for acl*release_security_pre_announce: Mglaser.
Jun 10 2025, 10:06 PM

Jun 9 2025

Mstyles added a comment to T396230: CVE-2025-6593: "{{SITENAME}} registered email address has been changed" email sent to unverified email addresses.

This should work as expected. However, I'm not actually able to test it locally on my machine because I do not have emailing set up locally (yet). This should be kept in mind when reviewing:

CR+1, we should be able to get this deployed during this Monday's security window. Would be nice (but not essential IMO) to get another set of eyes on this for review before then.

Jun 9 2025, 10:36 PM · MW-1.39-release, MW-1.42-release, MW-1.44-release, MW-1.43-release, Growth-Team, User-Michael, Vuln-Infoleak, SecTeam-Processed, Trust and Safety Product Team, MediaWiki-Email, Security, Security-Team
Mstyles added a comment to T395063: CVE-2025-6594: XSS in Special:ApiSandbox (User interaction required).

I suggest mentioning this task (T395063) in the two inline comments. LGTM, otherwise!

Done here:

Jun 9 2025, 10:35 PM · MW-1.43-release, MW-1.44-release, MediaWiki-Platform-Team, affects-Miraheze, SecTeam-Processed, MediaWiki-Action-API, Vuln-XSS, Security, Security-Team
Mstyles updated the task description for T389312: Write and send supplementary release announcement for extensions and skins with security patches (1.39.13/1.42.7/1.43.2).
Jun 9 2025, 4:23 PM · affects-Miraheze, user-sbassett, MediaWiki-Releasing, Security
Mstyles closed T394708: Security issue access for Paladox as Resolved.

Security issue access granted

Jun 9 2025, 3:30 PM · SecTeam-Processed, Security, Security-Team, affects-Miraheze
Mstyles added a member for Security: Paladox.
Jun 9 2025, 3:26 PM
Mstyles added a member for acl*security_volunteer: Paladox.
Jun 9 2025, 3:26 PM
Mstyles added a comment to T394708: Security issue access for Paladox.

Thanks so much @KFrancis. @Paladox we will need you to add 2FA to your account before security issue access can be granted. Please set up 2FA.

Jun 9 2025, 3:18 PM · SecTeam-Processed, Security, Security-Team, affects-Miraheze
Mstyles updated the task description for T389312: Write and send supplementary release announcement for extensions and skins with security patches (1.39.13/1.42.7/1.43.2).
Jun 9 2025, 3:14 PM · affects-Miraheze, user-sbassett, MediaWiki-Releasing, Security

Jun 3 2025

Mstyles added a comment to T380958: httpb sometimes fails upon deployment with a HTTP 503.
21:11:43 Started check-testservers
21:11:43 Executing check 'check_testservers_baremetal-1_of_1'
21:11:43 Executing check 'check_testservers_k8s-1_of_2'
21:11:43 Executing check 'check_testservers_k8s-2_of_2'
21:12:01 Check 'check_testservers_k8s-1_of_2' failed: Sending to mwdebug.discovery.wmnet...
https://donate.wikimedia.org/ (/srv/deployment/httpbb-tests/appserver/test_main.yaml:230)
    Status code: expected 302, got 503.
    Location header: expected 'https://donate.wikimedia.org/wiki/Special:FundraiserRedirector', was missing.
===
FAIL: 151 requests sent to mwdebug.discovery.wmnet. 1 request with failed assertions.
Jun 3 2025, 9:19 PM · Release-Engineering-Team (Radar), Deployments, serviceops, Wikimedia-production-error
Mstyles added a comment to T393403: Create a security pre-release Phabricator policy manageable by the Security Team.

You can update the View Policy by clicking on the Custom policy in Phab and adding a View Policy manually. I also sent a screenshot to explain

Jun 3 2025, 9:11 PM · MediaWiki-extensions-General, MediaWiki-General, Project-Admins, Release-Engineering-Team, Security, Security-Team

Jun 2 2025

Mstyles moved T394869: CVE-2025-7056: Stored XSS through a system message in UrlShortener from Security Patch To Deploy to Watching on the Security-Team board.

Updated patch:


Is it correctly formatted now?

Yep, CR+1, LGTM.

Jun 2 2025, 10:14 PM · Vuln-XSS, SecTeam-Processed, MediaWiki-extensions-UrlShortener, affects-Miraheze, Security, Security-Team
Mstyles moved T394612: CVE-2025-7057: Stored XSS through a system message in Extension:Quiz from Security Patch To Deploy to Watching on the Security-Team board.

Patch:

This looks reasonable to me. This should likely just get pushed through gerrit for public review since it's not bundled or Wikimedia-deployed. This can be done now or closer to the end of our quarter (2025-05-30) when we'll issue the next supplemental security release (T389312).

https://github.com/wikimedia/operations-mediawiki-config/blob/af3cd130d2b848052f93fc106ae4ebe8aa659f20/wmf-config/InitialiseSettings.php#L4097
Quiz is deployed on wikinews, wikiversity, wikibooks and three wikipedias.

Jun 2 2025, 10:14 PM · Security-Team, SecTeam-Processed, MediaWiki-extensions-Quiz, Vuln-XSS, affects-Miraheze, Security
Mstyles moved T394397: CVE-2025-53491: Special:PendingChanges vulnerable to i18n XSS from Security Patch To Deploy to Watching on the Security-Team board.

Woops. Not sure how I missed that. Thank you.

It seems that the plural syntax is currently broken on that message so that's a different issue.

Jun 2 2025, 10:13 PM · SecTeam-Processed, FlaggedRevs, Vuln-XSS, Security, Security-Team
Mstyles moved T395622: CVE-2025-53490: Multiple XSS-via-i18n in Special:EnableEventRegistration and Special:EditEventRegistration due to validation-callback from Security Patch To Deploy to Watching on the Security-Team board.
Jun 2 2025, 10:13 PM · SecTeam-Processed, Essential-Work, Vuln-XSS, Connection-Team (Connection-Current-Sprint), CampaignEvents, Security, Security-Team
Mstyles added a comment to T395622: CVE-2025-53490: Multiple XSS-via-i18n in Special:EnableEventRegistration and Special:EditEventRegistration due to validation-callback.

As usual, I'm assuming this to be low-risk since it's via i18n, but still, adding the patch here:

CR+2, we'll plan to get this deployed during today's (2025-06-02) security window.

Jun 2 2025, 10:12 PM · SecTeam-Processed, Essential-Work, Vuln-XSS, Connection-Team (Connection-Current-Sprint), CampaignEvents, Security, Security-Team
Mstyles added a comment to T395737: CVE-2025-53492: Stored XSS in Extension:MintyDocs still reproducible.

@Yaron_Koren sorry for not making that clear, checking in the change to Gerrit was exactly what I meant.

Jun 2 2025, 8:05 PM · SecTeam-Processed, Vuln-XSS, MediaWiki-extensions-MintyDocs, Security, Security-Team
Mstyles added a comment to T395737: CVE-2025-53492: Stored XSS in Extension:MintyDocs still reproducible.

@Yaron_Koren when you review this patch, it can go ahead and go through Gerrit since this extension is not deployed on WMF servers.

Jun 2 2025, 4:35 PM · SecTeam-Processed, Vuln-XSS, MediaWiki-extensions-MintyDocs, Security, Security-Team
Mstyles moved T395622: CVE-2025-53490: Multiple XSS-via-i18n in Special:EnableEventRegistration and Special:EditEventRegistration due to validation-callback from Incoming to Security Patch To Deploy on the Security-Team board.

+1 to this patch and going to get this out in today's security deploy. Adding support to the phan-taint-check-plugin for these issues is a great idea and I'll ping about a follow up task in case that doesn't happen.

Jun 2 2025, 4:26 PM · SecTeam-Processed, Essential-Work, Vuln-XSS, Connection-Team (Connection-Current-Sprint), CampaignEvents, Security, Security-Team
Mstyles added a comment to T394708: Security issue access for Paladox.

@KFrancis any update for the NDA since it's been signed?

Jun 2 2025, 4:13 PM · SecTeam-Processed, Security, Security-Team, affects-Miraheze

May 29 2025

Mstyles closed T393403: Create a security pre-release Phabricator policy manageable by the Security Team as Resolved.

If you 're still able to see the task, then you can confirm that you have access. I added acl*release_security_pre_announce as a view group, I didn't replace the acl*security policy. I already did this for T392746.

May 29 2025, 7:52 PM · MediaWiki-extensions-General, MediaWiki-General, Project-Admins, Release-Engineering-Team, Security, Security-Team
Mstyles added a comment to T394708: Security issue access for Paladox.

I reached out to Legal and they do not have a NDA signed for @Paladox. Could you go ahead and start that process?

May 29 2025, 4:00 PM · SecTeam-Processed, Security, Security-Team, affects-Miraheze
Mstyles added a comment to T394708: Security issue access for Paladox.

I'm following up with Legal and any other internal concerns and will report back with more information

May 29 2025, 12:49 AM · SecTeam-Processed, Security, Security-Team, affects-Miraheze

May 27 2025

Mstyles closed T393403: Create a security pre-release Phabricator policy manageable by the Security Team as Resolved.

@Aklapper using the acl*release_security_pre_announce project worked so I'm resolving this ticket. We can reopen it if something is needed in the future.

May 27 2025, 5:07 PM · MediaWiki-extensions-General, MediaWiki-General, Project-Admins, Release-Engineering-Team, Security, Security-Team
Mstyles moved T394708: Security issue access for Paladox from Incoming to In Progress on the Security-Team board.
May 27 2025, 4:01 PM · SecTeam-Processed, Security, Security-Team, affects-Miraheze
Mstyles added a project to T394828: People who are banned from clicking on forgot password can do so by visiting Urdu Wikipedia: Vuln-Misconfiguration.
May 27 2025, 3:54 PM · MediaWiki-Platform-Team, MediaWiki-Core-AuthManager, SecTeam-Processed, Security-Team
Mstyles updated the task description for T389312: Write and send supplementary release announcement for extensions and skins with security patches (1.39.13/1.42.7/1.43.2).
May 27 2025, 3:45 PM · affects-Miraheze, user-sbassett, MediaWiki-Releasing, Security
Mstyles added a project to T394721: CVE-2025-7363: XSS in TitleIcon: Vuln-XSS.
May 27 2025, 3:40 PM · SecTeam-Processed, Vuln-XSS, MediaWiki-extensions-Title-Icon, affects-Miraheze, Security, Security-Team
Mstyles updated subscribers of T394397: CVE-2025-53491: Special:PendingChanges vulnerable to i18n XSS.
May 27 2025, 3:37 PM · SecTeam-Processed, FlaggedRevs, Vuln-XSS, Security, Security-Team
Mstyles updated subscribers of T394397: CVE-2025-53491: Special:PendingChanges vulnerable to i18n XSS.

@dmaza @lwatson you recently addressed a codex issue in T394396, do you think you could take a look at this issue?

May 27 2025, 3:37 PM · SecTeam-Processed, FlaggedRevs, Vuln-XSS, Security, Security-Team
Mstyles added a comment to T394397: CVE-2025-53491: Special:PendingChanges vulnerable to i18n XSS.

@Dreamy_Jazz thank you for reporting this issue. I'll ask around and see if anyone is interested in working on this.

May 27 2025, 3:32 PM · SecTeam-Processed, FlaggedRevs, Vuln-XSS, Security, Security-Team
Mstyles added a comment to T394397: CVE-2025-53491: Special:PendingChanges vulnerable to i18n XSS.

@Dreamy_Jazz are you intending to work on this ticket or should I look for another contributor?

May 27 2025, 3:24 PM · SecTeam-Processed, FlaggedRevs, Vuln-XSS, Security, Security-Team

May 23 2025

Mstyles changed the visibility for T392746: CVE-2025-6590: Complete content leak of private wikis due to PasswordReset Wikitext injection in error message.
May 23 2025, 4:21 PM · MW-1.39-release, MW-1.42-release, MW-1.43-release, MW-1.44-notes, SecTeam-Processed, MediaWiki-User-login-and-signup, MediaWiki-HTMLForm, Vuln-Infoleak, Security, Security-Team
Mstyles added a member for acl*release_security_pre_announce: NASA-ksaid.
May 23 2025, 4:20 PM

May 22 2025

Mstyles added a comment to T393403: Create a security pre-release Phabricator policy manageable by the Security Team.

Since this would only be for a few tasks per year @Aklapper, changing the View Policy for a few tasks would be okay.

May 22 2025, 7:39 PM · MediaWiki-extensions-General, MediaWiki-General, Project-Admins, Release-Engineering-Team, Security, Security-Team

May 20 2025

Mstyles added a comment to T393403: Create a security pre-release Phabricator policy manageable by the Security Team.

@Aklapper if you could create the ACL with the security team as the manager that would be great.

May 20 2025, 9:09 PM · MediaWiki-extensions-General, MediaWiki-General, Project-Admins, Release-Engineering-Team, Security, Security-Team

May 19 2025

Mstyles moved T393403: Create a security pre-release Phabricator policy manageable by the Security Team from Incoming to In Progress on the Security-Team board.
May 19 2025, 4:22 PM · MediaWiki-extensions-General, MediaWiki-General, Project-Admins, Release-Engineering-Team, Security, Security-Team
Mstyles added a comment to T393403: Create a security pre-release Phabricator policy manageable by the Security Team.

@Aklapper I can provide more information offline, if that would be helpful.

May 19 2025, 4:21 PM · MediaWiki-extensions-General, MediaWiki-General, Project-Admins, Release-Engineering-Team, Security, Security-Team
Mstyles added a comment to T367677: CVE-2020-28496 affecting 3D extension (ReDoS).

@Reedy for the testing issues with 1.39, would you recommend just merging as is with the tests failing or taking a different approach?

May 19 2025, 4:20 PM · Structured-Data-Backlog, Patch-For-Review, SecTeam-Processed, 3D, Security, Security-Team
Mstyles added a comment to T385403: Wrong E-Mail address composition for usernames with a comma in it "Doe, John" (observed today in MW 1.41.0).

Do you have any test plans or paths or code that you can point to as well for this issue?

May 19 2025, 4:14 PM · MediaWiki-Engineering, Vuln-Misconfiguration, MediaWiki-Email, Security, Security-Team
Mstyles added a comment to T385403: Wrong E-Mail address composition for usernames with a comma in it "Doe, John" (observed today in MW 1.41.0).

Thank you for this report. This is not replicable in 1.44.0, If you could provide any more information, that would be appreciated

May 19 2025, 4:09 PM · MediaWiki-Engineering, Vuln-Misconfiguration, MediaWiki-Email, Security, Security-Team

May 5 2025

Mstyles added a comment to T392341: CVE-2025-53483, CVE-2025-53484, CVE-2025-53485: SecurePoll is vulnerable to XSS, CSRF, and lack of authorisation.

@STran are these patches ready for deployment? I would like to make sure they get out sooner than later.

May 5 2025, 3:28 PM · Trust and Safety Product Sprint (Sprint Cannoli (July 7 - July 25)), Patch-For-Review, Trust and Safety Product Team, Vuln-BrokenAccessControl, affects-Miraheze, Vuln-CSRF, Vuln-XSS, MediaWiki-extensions-SecurePoll, Security, Security-Team

May 3 2025

Mstyles added a comment to T387703: Add more verbose information when update fails.

I am not sure if this issue still exists. I tried to change the owner of my binary and wasn't able to exactly replicate this issue. However, I did fix a different update message and I added the change to this ticket.

May 3 2025, 8:57 AM · mwcli

Apr 28 2025

Mstyles added a comment to T392341: CVE-2025-53483, CVE-2025-53484, CVE-2025-53485: SecurePoll is vulnerable to XSS, CSRF, and lack of authorisation.

@STran @BlankEclair what are the status on these patches. I've reviewed them and they look good to me, but it seems that there's still active work ongoing. I can wait until next week to deploy if necessary.

Apr 28 2025, 4:34 PM · Trust and Safety Product Sprint (Sprint Cannoli (July 7 - July 25)), Patch-For-Review, Trust and Safety Product Team, Vuln-BrokenAccessControl, affects-Miraheze, Vuln-CSRF, Vuln-XSS, MediaWiki-extensions-SecurePoll, Security, Security-Team
Mstyles moved T392341: CVE-2025-53483, CVE-2025-53484, CVE-2025-53485: SecurePoll is vulnerable to XSS, CSRF, and lack of authorisation from Incoming to In Progress on the Security-Team board.
Apr 28 2025, 4:27 PM · Trust and Safety Product Sprint (Sprint Cannoli (July 7 - July 25)), Patch-For-Review, Trust and Safety Product Team, Vuln-BrokenAccessControl, affects-Miraheze, Vuln-CSRF, Vuln-XSS, MediaWiki-extensions-SecurePoll, Security, Security-Team

Apr 24 2025

Mstyles added a comment to T392341: CVE-2025-53483, CVE-2025-53484, CVE-2025-53485: SecurePoll is vulnerable to XSS, CSRF, and lack of authorisation.

ArchivePage.php and UnarchivePage.php require token

Apr 24 2025, 8:35 PM · Trust and Safety Product Sprint (Sprint Cannoli (July 7 - July 25)), Patch-For-Review, Trust and Safety Product Team, Vuln-BrokenAccessControl, affects-Miraheze, Vuln-CSRF, Vuln-XSS, MediaWiki-extensions-SecurePoll, Security, Security-Team
Mstyles closed T392466: Security Issue Access Request for mszabo as Resolved.

Security issue access granted

Apr 24 2025, 8:25 PM · SecTeam-Processed, Security-Team, Security
Mstyles added a member for Security: mszabo.
Apr 24 2025, 8:24 PM
Mstyles added a member for acl*security_developer: mszabo.
Apr 24 2025, 8:24 PM

Apr 23 2025

Mstyles created T392542: Create Incident Runbooks.
Apr 23 2025, 11:01 PM · SecTeam-Processed, user-sbassett, Epic, Security, Security-Team
Mstyles added a parent task for T392521: Create audit scripts and dashboards for Phabricator and related tools: Unknown Object (Task).
Apr 23 2025, 10:53 PM · SecTeam-Processed, Security-Team, Security
Mstyles added a comment to T367677: CVE-2020-28496 affecting 3D extension (ReDoS).

Still working on backports for 1.39 and 1.42

Apr 23 2025, 5:12 PM · Structured-Data-Backlog, Patch-For-Review, SecTeam-Processed, 3D, Security, Security-Team
Mstyles changed the visibility for T367677: CVE-2020-28496 affecting 3D extension (ReDoS).
Apr 23 2025, 5:11 PM · Structured-Data-Backlog, Patch-For-Review, SecTeam-Processed, 3D, Security, Security-Team
Mstyles added a comment to T385337: Security review for python package dbt-metabase.

@Dwisehaupt thank you for the update.

Apr 23 2025, 3:31 PM · secscrum, FR-Tech-Analytics, Privacy Engineering, Security Preview, fundraising-tech-ops

Apr 21 2025

Mstyles added a comment to T385337: Security review for python package dbt-metabase.

Hey @Dwisehaupt do you have a particular date for this python package to go into production? I'll be doing a fairly quick vendor review.

Apr 21 2025, 6:46 PM · secscrum, FR-Tech-Analytics, Privacy Engineering, Security Preview, fundraising-tech-ops

Apr 16 2025

Mstyles closed T366302: Supply Chain Attack Threat Model as Resolved.
Apr 16 2025, 8:55 PM · Security, Application Security Reviews, secscrum
Mstyles added a comment to T366302: Supply Chain Attack Threat Model.

The supply chain report has been shared to all relevant persons and a lot of feedback has been taken into account. I'm marking this ticket as closed, but feel free to reopen if there is any follow up.

Apr 16 2025, 8:55 PM · Security, Application Security Reviews, secscrum

Apr 14 2025

Mstyles added a comment to T367677: CVE-2020-28496 affecting 3D extension (ReDoS).

Once we get the backport merged for 1_39, we want to make this ticket public. Any objections?

Apr 14 2025, 4:16 PM · Structured-Data-Backlog, Patch-For-Review, SecTeam-Processed, 3D, Security, Security-Team