Page MenuHomePhabricator

Bawolff (Brian Wolff)
Busy-bodyAdministrator

Today

  • Clear sailing ahead.

Tomorrow

  • Clear sailing ahead.

Wednesday

  • Clear sailing ahead.

User Details

User Since
Oct 25 2014, 1:53 AM (532 w, 2 d)
Roles
Administrator
Availability
Available
IRC Nick
Bawolff
LDAP User
Brian Wolff
MediaWiki User
Bawolff [ Global Accounts ]

Hi!

Recent Activity

Yesterday

Bawolff added a comment to T265726: Assign oathauth-verify-user to bureaucrats on WMF wikis.

As an aside, perhaps a better solution would be to simply reject adding the group in [[Special:UserRights]] if the user does not have 2FA and 2FA is required for the group (Ideally only check during submit to prevent enumeration). Or perhaps force the user to enable 2FA during their next login.

Sun, Jan 5, 9:50 PM · Privacy Engineering, WMF-Legal, Wikimedia-Site-requests, Privacy

Fri, Jan 3

Bawolff added a comment to T382859: Server-side upload request for Koavf.

Personally i believe that such lists of files to upload when the limit increases should instead be on commons. There is probably thousands of such files, and their url might change in the next decade. Not to mention that this process might not even be the correct process in a decade's time (One certainly hopes in a decade upload by url would be stable enough that the upload would be done directly on commons).

Fri, Jan 3, 7:43 AM · Server-side-upload-request
Bawolff added a comment to T382859: Server-side upload request for Koavf.

The current max file size is 5GB (T191804).

Then this may need to be a child bug to a parent that is about increasing the max upload size so it can just be put on a list of files that could/would/should be uploaded when the max size is increased.

Fri, Jan 3, 1:45 AM · Server-side-upload-request

Mon, Dec 30

Bawolff added a comment to T246901: Support full colour 3D models on Wikimedia projects.

Would it be helpful to have a document somewhere, writing up requirements and/or best practices on the following considerations ...

Mon, Dec 30, 12:35 AM · Wikimedia-Hackathon-2024, User-John_Cummings, Commons, 3D

Sun, Dec 22

Bawolff added a comment to T382566: MediaWiki installer has extra newlines on radio buttons when selecting installer type.

It does look like there are other buttons with a similar issue.

Sun, Dec 22, 8:15 AM · MW-1.44-notes (1.44.0-wmf.12; 2025-01-14), MediaWiki-Installer

Fri, Dec 20

Bawolff added a comment to T382432: CentralAuth on SQLite is prone to deadlocks when using a separate database.

I made a hacky version of what i mean as a proof of concept (code is just a hack, not a proper implementation).

Fri, Dec 20, 10:25 AM · Patch-For-Review, MediaWiki-libs-Rdbms, SQLite, MediaWiki-extensions-CentralAuth, MediaWiki-Platform-Team
Bawolff created T382567: Installer has no spacing between links in checkbox labels on extension list.
Fri, Dec 20, 6:25 AM · Design-System-Team, Codex, MediaWiki-Installer
Bawolff added a comment to T337435: Redesign MediaWiki installer.

I'm seeing some weird newlines on the dbconnect page T382566

Fri, Dec 20, 6:15 AM · MW-1.42-notes (1.42.0-wmf.14; 2024-01-16), MediaWiki CodeJam Dec 2023, Design-System-Team, CSS, MediaWiki-Installer
Bawolff created T382566: MediaWiki installer has extra newlines on radio buttons when selecting installer type.
Fri, Dec 20, 6:13 AM · MW-1.44-notes (1.44.0-wmf.12; 2025-01-14), MediaWiki-Installer
Bawolff added a comment to T382432: CentralAuth on SQLite is prone to deadlocks when using a separate database.

Anyways, I feel like using BEGIN IMMEDIATE everywhere is not the right approach. I feel like a better thing to do would be:

Fri, Dec 20, 5:30 AM · Patch-For-Review, MediaWiki-libs-Rdbms, SQLite, MediaWiki-extensions-CentralAuth, MediaWiki-Platform-Team
Bawolff added a comment to T382432: CentralAuth on SQLite is prone to deadlocks when using a separate database.

As soon as we start a transaction with BEGIN IMMEDIATE, the whole database is locked. Other threads can't even start their own transactions because of the IMMEDIATE: it makes SQLite consider the transaction as a write transaction, right from the get go, regardless of whether any writes will be performed. This was done to mitigate other deadlocks in T89180 / T93097.

Fri, Dec 20, 1:08 AM · Patch-For-Review, MediaWiki-libs-Rdbms, SQLite, MediaWiki-extensions-CentralAuth, MediaWiki-Platform-Team

Tue, Dec 17

Bawolff added a project to T382376: PageViewInfo caches errors due to the request limit which can lead to denial of service: Security.

[Not sure if security considers this type of DoS in its purview or not. I tend to think of this as more being just an ordinary bug]

Tue, Dec 17, 9:43 PM · Security, PageViewInfo, Vuln-DoS
Bawolff created T382376: PageViewInfo caches errors due to the request limit which can lead to denial of service.
Tue, Dec 17, 9:35 PM · Security, PageViewInfo, Vuln-DoS
Bawolff added a comment to T235588: PageViewInfo should include media counts on ?action=info for stuff in File namespace.

I would also really like to have this ability. Does anyone know if there are any other ways to find out this information? Specifically I want to know how many views Media Viewer pages get on English Wikipedia

Tue, Dec 17, 9:27 PM · PageViewInfo
Bawolff added a comment to T362937: Expose page view info to lua.

One issue here is that $wgPageViewInfoWikimediaRequestLimit (currently 5) might not make sense, because multiple pages could be rendered in a single request (especially in the job queue).

Tue, Dec 17, 9:23 PM · PageViewInfo

Mon, Dec 9

Bawolff added a comment to T381769: Potential RCE in Extension:ArticleFeedbackv5.

The main scary part of log_params is when really old code use the old newline serialization method which is kind of unsafe in context. But that is besides the point.

Mon, Dec 9, 3:21 PM · affects-Miraheze, ArticleFeedbackv5, Security

Dec 6 2024

Bawolff added a comment to T381709: Parsoid support for 'general' vs 'nowiki' strip markers.

One major difference, is if you use recursiveTagParse() and output the result in a strip marker, the use of a general strip marker means that links still work, where in a nowiki strip marker, i don't think they do.

Dec 6 2024, 10:22 PM · Parsoid-Read-Views, Parsoid
Bawolff added a comment to T381699: Skin not found page links to category in Special:MyLanguage which doesn't show all skins.

Yeah, some of those links do look bad. Like if the user ends up on https://www.mediawiki.org/wiki/Category:All_skins/km they aren't going to find what they are looking for

Dec 6 2024, 8:06 PM · MW-1.44-notes (1.44.0-wmf.12; 2025-01-14), MediaWiki-User-Interface
Bawolff created T381699: Skin not found page links to category in Special:MyLanguage which doesn't show all skins.
Dec 6 2024, 8:05 PM · MW-1.44-notes (1.44.0-wmf.12; 2025-01-14), MediaWiki-User-Interface

Dec 5 2024

Bawolff added a comment to T381612: [Spike] Explore rendering chart into document fragment before adding to page.

Keep in mind, this sort of thing is much harder than it looks if you need to account for mXSS.

Dec 5 2024, 9:47 PM · Spike, Security, Charts
Bawolff updated subscribers of T378451: Server side upload for Yann.
Dec 5 2024, 4:58 PM · Server-side-upload-request, video2commons
Bawolff added a comment to T378451: Server side upload for Yann.

Perhaps wmf teams related to commons can help? With all respect, the lack of maintenence effort on mediawiki file backends is creating an undue burden on volunteers with shell to complete these types of tasks.

Dec 5 2024, 4:54 PM · Server-side-upload-request, video2commons

Nov 30 2024

Bawolff added a comment to T334372: Add support for inline SVG.

As an aside, I just realized you can do a surprising amount of drawing with just CSS. See https://en.wikipedia.org/wiki/Module:Sandbox/Bawolff/canvas for an example.

Nov 30 2024, 12:29 AM · Patch-For-Review, Wikimedia-Hackathon-2024, MediaWiki-Parser

Nov 28 2024

Bawolff added a comment to T380949: MediaViewer shows "Error: file does not exist" when clicking on a thumbnail of a file that is not the current version of the file.

I think Special:ListFiles is one of the few places where you can get a thumbnail of a file that is not the current version. FlaggedRevs might also be able to make that happen.

Nov 28 2024, 6:16 PM · Commons, MediaWiki-File-management, MediaViewer
Bawolff renamed T380949: MediaViewer shows "Error: file does not exist" when clicking on a thumbnail of a file that is not the current version of the file from MediaViewer shows "Error: file does not exist" for a particular file in user uploads to MediaViewer shows "Error: file does not exist" when clicking on a thumbnail of a file that is not the current version of the file.
Nov 28 2024, 6:15 PM · Commons, MediaWiki-File-management, MediaViewer
Bawolff added a comment to T380949: MediaViewer shows "Error: file does not exist" when clicking on a thumbnail of a file that is not the current version of the file.

For example consider https://commons.wikimedia.org/w/index.php?title=Special:ListFiles&offset=20130105&user=BotMultichillT&ilshowall=1 - all the files marked yes under the "current version" column on that list work, all the ones marked no, do not.

Nov 28 2024, 6:14 PM · Commons, MediaWiki-File-management, MediaViewer
Bawolff added a comment to T380949: MediaViewer shows "Error: file does not exist" when clicking on a thumbnail of a file that is not the current version of the file.

I think its because another user uploaded a new version. Special:ListFiles shows the old version that Bigtime Boy uploaded. However this confuses MediaViewer which assumes that all thumbnails are for the current version.

Nov 28 2024, 6:11 PM · Commons, MediaWiki-File-management, MediaViewer

Nov 27 2024

Bawolff added a comment to T380982: V2C should retry failed uploads.

To give some context - its known that certain upload failures are intermittent. For example if there is a new deploy in the middle of the upload. It would be great if v2c retried at least once before telling users to request a server side upload.

Nov 27 2024, 5:50 PM · video2commons

Nov 25 2024

Bawolff added a comment to T260286: Deprecate xcf files.

Just fyi, here is a perma-link to the discussion on commons https://commons.wikimedia.org/wiki/Commons:Village_pump/Proposals/Archive/2020/08#RfC%3A_Deprecate_XCF_file_format . It wasn't a popular proposal.

Nov 25 2024, 6:56 PM · Wikimedia-Site-requests, Community-consensus-needed, Commons, Thumbor, MediaWiki-File-management

Nov 24 2024

Bawolff added a comment to T371662: Disable LonelyPages and Deadendpages on commons.

Above patch adds a message to use here.

I’m not sure if it really should be on Gerrit. Being a wiki-specific message, it could just as well be defined on-wiki. Defining on-wiki would, for example, make backlinks work, so should that discussion ever moved away, people will be aware that it needs to be updated.

Nov 24 2024, 1:38 PM · Patch-For-Review, Wikimedia-Site-requests, Commons

Nov 21 2024

Bawolff renamed T380456: Reports that class constants aren't resolved properly by autoloader in php 8.4 from Reports of AbuseFilter incompatible with php 8.4 when running maintenance scripts to Reports that class constants aren't resolved properly by autoloader in php 8.4.
Nov 21 2024, 5:40 PM · AbuseFilter, PHP 8.4 support
Bawolff updated the task description for T380456: Reports that class constants aren't resolved properly by autoloader in php 8.4.
Nov 21 2024, 11:16 AM · AbuseFilter, PHP 8.4 support
Bawolff created T380456: Reports that class constants aren't resolved properly by autoloader in php 8.4.
Nov 21 2024, 11:12 AM · AbuseFilter, PHP 8.4 support

Nov 20 2024

Bawolff added a comment to T115430: Undeploy the 'Cologne Blue' and 'Modern' skins from Wikimedia production.

Given its not even possible to set your skin to cologneblue or modern in Special:Preferences without using a secret url parameter, I don't see much point in keeping these skins deployed.

Nov 20 2024, 11:13 AM · User-notice, Modern, CologneBlue, Wikimedia-Site-requests, Web-Team-Backlog

Nov 12 2024

Bawolff renamed T379614: 500 error from onthisday REST api endpoint "No content returned by backend" from 500 error from onthisday REST api endpoint to 500 error from onthisday REST api endpoint "No content returned by backend".
Nov 12 2024, 1:48 PM · RESTBase-API
Bawolff added a comment to T379614: 500 error from onthisday REST api endpoint "No content returned by backend".

btw, this seems to be the log entry for the 500 the user from discord experienced https://logstash.wikimedia.org/app/discover#/doc/logstash-*/logstash-default-1-7.0.0-1-2024.11.12?id=AL88IJMBLmySI1N_AuNw

Nov 12 2024, 1:47 PM · RESTBase-API
Bawolff created T379614: 500 error from onthisday REST api endpoint "No content returned by backend".
Nov 12 2024, 11:41 AM · RESTBase-API
Bawolff added a comment to T375253: zhwikipedia, zhwikinews API request for every article, links from sitenotice to external, unaffiliated sites.

I'm pretty sure you're not allowed to link to or even mention the brand names Telegram or Instagram or Google from a sitenotice. you can't from a CentralNotice, I don't see why a different policy should apply here.

Nov 12 2024, 9:59 AM · Privacy Engineering, Chinese-Sites, Trust-and-Safety, Traffic, Privacy

Nov 9 2024

Bawolff added a comment to T378385: Spike in JobQueue job backlog time (500ms -> 4-8 minutes).

That said, it does seem like the p99 for AssembleChunkUpload jobs has spiked to ~15 min for the last 2 hours (was fine before that point), so maybe that is just it. Maybe driven by a spike in ChangeDeletionNotification jobs. Sounds like a dedicated queue as Scott suggests would really help.

Nov 9 2024, 10:18 AM · FlaggedRevs, serviceops, WMF-JobQueue
Bawolff added a comment to T378385: Spike in JobQueue job backlog time (500ms -> 4-8 minutes).

@MBH lets open a separate new task to investigate, as the cause could be something different than the job queue thing this task is about. If you want you could email the HAR file to me ( bawolff@gmail.com ).

Nov 9 2024, 10:01 AM · FlaggedRevs, serviceops, WMF-JobQueue
Bawolff added a comment to T379070: Special:Undelete does not go to right page if you check the checkbox to adjust revision visibility for a deleted file revision.

Right. The point of this bug is it is confusing to have the checkboxes beside the items in the file history section if they do not do anything. They should either be removed or connected to the button.

Nov 9 2024, 1:06 AM · good first task, MediaWiki-Page-deletion

Nov 8 2024

Bawolff added a comment to T379070: Special:Undelete does not go to right page if you check the checkbox to adjust revision visibility for a deleted file revision.

I mean the circled button "change visibility of selected revisions", not the text link.

Nov 8 2024, 6:27 AM · good first task, MediaWiki-Page-deletion
Bawolff created T379342: TemplateStyles on REL1_42 causing issues with scoped-callback v5 which is incompatible with 1.42.
Nov 8 2024, 5:58 AM · MW-1.42-release, TemplateStyles

Nov 6 2024

Bawolff created T379152: RevisionFromEditComplete hook no longer allows you to modify tags.
Nov 6 2024, 1:25 PM · Patch-For-Review, MW-1.44-notes (1.44.0-wmf.2; 2024-11-05), MW-Interfaces-Team, Regression, MW-1.44-release, MediaWiki-Core-Hooks
Bawolff added a comment to T379070: Special:Undelete does not go to right page if you check the checkbox to adjust revision visibility for a deleted file revision.

Not that button, the "change visibility" button. It only shows up if your user account has the correct rights, which admins might not have by default.

Nov 6 2024, 12:58 AM · good first task, MediaWiki-Page-deletion

Nov 5 2024

Bawolff updated the task description for T379070: Special:Undelete does not go to right page if you check the checkbox to adjust revision visibility for a deleted file revision.
Nov 5 2024, 1:19 PM · good first task, MediaWiki-Page-deletion
Bawolff created T379070: Special:Undelete does not go to right page if you check the checkbox to adjust revision visibility for a deleted file revision.

Thank you for tagging this task with good first task for Wikimedia newcomers!

Nov 5 2024, 1:15 PM · good first task, MediaWiki-Page-deletion
Bawolff merged task T378276: Mass uploads to Commons doesn't work for me into T378385: Spike in JobQueue job backlog time (500ms -> 4-8 minutes).
Nov 5 2024, 2:22 AM · MediaWiki-Uploading, UploadWizard, Commons
Bawolff merged T378276: Mass uploads to Commons doesn't work for me into T378385: Spike in JobQueue job backlog time (500ms -> 4-8 minutes).
Nov 5 2024, 2:22 AM · FlaggedRevs, serviceops, WMF-JobQueue
Bawolff awarded T379035: Consider lifting AssembleUploadChunks and PublishStashedFile out of the low-traffic consumer a Manufacturing Defect? token.
Nov 5 2024, 2:17 AM · serviceops

Oct 31 2024

Bawolff added a comment to T378385: Spike in JobQueue job backlog time (500ms -> 4-8 minutes).

Just as an aside, I believe PublishStashedFile AssembleUploadChunks are considered low traffic job. Unlike normal jobs these are very latency sensitive, as they don't happen in the background, but the UI actually makes users wait well these jobs complete (See also T378276). It would be really great if somehow these jobs can be prioritized in a job queue backlog situation.

Oct 31 2024, 9:23 PM · FlaggedRevs, serviceops, WMF-JobQueue
Bawolff added a comment to T378276: Mass uploads to Commons doesn't work for me.

This issue is probably caused by T378385.

Oct 31 2024, 9:17 PM · MediaWiki-Uploading, UploadWizard, Commons
Bawolff added a comment to T378276: Mass uploads to Commons doesn't work for me.

I don't know what is HAR file, but I am some sort of technically literate user, so maybe I can obtain it if you explain me how to create it.

Oct 31 2024, 7:54 PM · MediaWiki-Uploading, UploadWizard, Commons
Bawolff added a comment to T378276: Mass uploads to Commons doesn't work for me.

After briefly looking through the logs, i see a bunch of cases where it looked like it took about 2.5 minutes between the publish job being sent and the job queue picking it up. I'm not sure if that's considered within acceptable time frame, or what normal time frame for something like this is. I don't know if i'm looking at the right files, so I'm not sure if this is what is being complained about.

Oct 31 2024, 3:38 AM · MediaWiki-Uploading, UploadWizard, Commons
Bawolff added a comment to T378276: Mass uploads to Commons doesn't work for me.

Seeing some:
HEAD http://ms-fe.svc.codfw.wmnet/wikipedia/commons/thumb/1/1c/Holy_Transfiguration_Armenian_Cathedral%2C_Moscow_52.jpg/320px-Holy_Transfiguration_Armenian_Cathedral%2C_Moscow_52.jpg HTTP/1.1 - NULL cURL error 28: Connection timed out after 1000 milliseconds

Oct 31 2024, 3:26 AM · MediaWiki-Uploading, UploadWizard, Commons
Bawolff added a comment to T378276: Mass uploads to Commons doesn't work for me.

It would probably help to know:

Oct 31 2024, 3:03 AM · MediaWiki-Uploading, UploadWizard, Commons
Bawolff added a comment to T378276: Mass uploads to Commons doesn't work for me.

Seems like there are multiple complaints https://commons.wikimedia.org/wiki/Commons:Village_pump/Technical#Upload_Wizard_very_slow

Oct 31 2024, 2:52 AM · MediaWiki-Uploading, UploadWizard, Commons
Bawolff updated the task description for T378276: Mass uploads to Commons doesn't work for me.
Oct 31 2024, 2:47 AM · MediaWiki-Uploading, UploadWizard, Commons

Oct 30 2024

Bawolff added a comment to T369950: Application Security Review Request : Chart extension and chart-renderer service.

Also in the sense that testwiki is in $wgCrossSiteAJAXdomains. You should assume that if you compromise an account on testwiki (e.g. via an XSS) it compromises it on all wikis

Oct 30 2024, 8:58 PM · Charts (Sprint 11), secscrum, Security, Application Security Reviews
Bawolff added a comment to T377222: Don’t use raw HTML messages in safe mode.

The copyright footer is not shown on Special:UserLogin, nor (as far as I can tell) on any other page that has JS disabled;

Oct 30 2024, 8:32 PM · MW-1.44-notes (1.44.0-wmf.4; 2024-11-19), SecTeam-Processed, Vuln-XSS, Vuln-Misconfiguration, I18n, MediaWiki-Internationalization, Security, Security-Team

Oct 29 2024

Bawolff added a comment to T378451: Server side upload for Yann.

Huh, seems like that should have already been fixed https://github.com/toolforge/video2commons/issues/207

Oct 29 2024, 4:36 PM · Server-side-upload-request, video2commons

Oct 27 2024

Bawolff created T378305: chart-renderer should validate idPrefix field.
Oct 27 2024, 9:36 PM · Charts (Sprint 13), Security

Oct 23 2024

Bawolff added a comment to T377912: Possible remote user supplied PHP class name loading (translatewiki.net).

From security perspective, I guess you can load any file in includes ending in .php, since that is what the MediaWiki namespace is mapped to (and who knows what else in extensions and vendor). Still it seems hard to come up with anything evil.

Oct 23 2024, 10:02 AM · affects-translatewiki.net, MediaWiki-Engineering, MediaWiki-extensions-LiquidThreads, Security, Security-Team
Bawolff added a comment to T377912: Possible remote user supplied PHP class name loading (translatewiki.net).

It is unclear to me what is causing a code injection if any? My guess is one can craft a title in a LiquidThread topic that causes a PHP file in the include path to be autoloaded (and thus potentially allowing arbitrary code execution)?

Agreed – though I’m not sure if this can actually cause arbitrary code execution. Also, my guess would be that this affects a lot more than LQT, as it seems to be triggered by a bog-standard Message::plaintextParams() call.

Possible fix?

diff --git a/includes/libs/Message/ScalarParam.php b/includes/libs/Message/ScalarParam.php
index 729746f500..467ef2855a 100644
--- a/includes/libs/Message/ScalarParam.php
+++ b/includes/libs/Message/ScalarParam.php
@@ -42,7 +42,7 @@ public function __construct( $type, $value ) {
 			// Ensure that $this->value is JSON-serializable, even if $value is not
 			// (but don't do it when using ParamType::OBJECT, since those objects may not expect it)
 			$value = MessageValue::newFromSpecifier( $value );
-		} elseif ( $value instanceof Stringable || is_callable( [ $value, '__toString' ] ) ) {
+		} elseif ( is_object( $value ) && ( $value instanceof Stringable || is_callable( [ $value, '__toString' ] ) ) ) {
 			// TODO: Remove separate '__toString' check above once we drop PHP 7.4
 			$value = (string)$value;
 		} elseif ( !is_string( $value ) && !is_numeric( $value ) ) {

(I.e. avoid the is_callable() check if the arg is a string.)

Oct 23 2024, 9:27 AM · affects-translatewiki.net, MediaWiki-Engineering, MediaWiki-extensions-LiquidThreads, Security, Security-Team
Bawolff lowered the priority of T377912: Possible remote user supplied PHP class name loading (translatewiki.net) from Unbreak Now! to Needs Triage.

Ah, i think i overreacted here. Sorry for the panic

Oct 23 2024, 9:24 AM · affects-translatewiki.net, MediaWiki-Engineering, MediaWiki-extensions-LiquidThreads, Security, Security-Team
Bawolff added a comment to T377912: Possible remote user supplied PHP class name loading (translatewiki.net).

If possible, it would help to know what the subject line of any LQT threads from that page were, if they were suspicious [possibly the suspicious subject lines were just being previewed and not saved]

Oct 23 2024, 9:07 AM · affects-translatewiki.net, MediaWiki-Engineering, MediaWiki-extensions-LiquidThreads, Security, Security-Team
Bawolff added a comment to T377912: Possible remote user supplied PHP class name loading (translatewiki.net).

So I'm not very familiar with LQT, so i might be overreacting, but to me that exception looks like what would happen if there was some sort of deserialization vuln happening

Oct 23 2024, 9:06 AM · affects-translatewiki.net, MediaWiki-Engineering, MediaWiki-extensions-LiquidThreads, Security, Security-Team
Bawolff triaged T377912: Possible remote user supplied PHP class name loading (translatewiki.net) as Unbreak Now! priority.

At a glance, i think you should assume whatever server this was running under is likely compromised.

Oct 23 2024, 8:56 AM · affects-translatewiki.net, MediaWiki-Engineering, MediaWiki-extensions-LiquidThreads, Security, Security-Team
Bawolff added a comment to T377912: Possible remote user supplied PHP class name loading (translatewiki.net).

Wait, was T179080 never fixed? Kind of sounds a little like that. But im not sure, very likely could be wrong. think that is unrelated

Oct 23 2024, 8:43 AM · affects-translatewiki.net, MediaWiki-Engineering, MediaWiki-extensions-LiquidThreads, Security, Security-Team
Bawolff added a comment to T40010: RFC: Re-evaluate librsvg as SVG renderer on Wikimedia wikis.

Say the wiki page selects either the SVG or PNG rendering based on size. Say it is a small SVG file and SVG is selected. Now somebody comes along and uploads a 20 MB SVG images on top of the original, small, SVG. That would mean all the pages that reference that SVG file need to be rebuilt even though the aspect ratio did not change. Alternatively, the fetch of the overweight SVG should be turned into a PNG fetch. Maybe page rebuilds are not expensive, but some SVG files are used on a lot of pages.

Oct 23 2024, 4:54 AM · Proposal, Thumbor, MediaWiki-File-management, Commons, Wikimedia-SVG-rendering
Bawolff added a comment to T40010: RFC: Re-evaluate librsvg as SVG renderer on Wikimedia wikis.

Re glrx:

I'm not an expert, but I think that change would be localized to Thumbor. If Thumbor is asked to rasterize an SVG file, it can notice the file is small and then serve it directly. If Thumbor sets the MIME type, then I think the img element will display it properly. But it also butchers the current semantics. A URL that formerly always gave a PNG file now might give an SVG file. Some OCR code I use will not take SVG but will take PNG; I use something like {{filepath:foo.svg|800}} to get a PNG. Maybe add something to the URL that requires a PNG or obey HTTP requests that ask only for a PNG MIME type.

Oct 23 2024, 1:12 AM · Proposal, Thumbor, MediaWiki-File-management, Commons, Wikimedia-SVG-rendering

Oct 22 2024

Bawolff added a comment to T40010: RFC: Re-evaluate librsvg as SVG renderer on Wikimedia wikis.

If you are effectively saying that an SVG rasterizer yields better results on files which contain JavaScript than client-side rendering of the same file via <img>, please highlight that significant concern in T5593.

Oct 22 2024, 7:54 PM · Proposal, Thumbor, MediaWiki-File-management, Commons, Wikimedia-SVG-rendering
Bawolff added a comment to T40010: RFC: Re-evaluate librsvg as SVG renderer on Wikimedia wikis.

there was no robust and up-to-date FLOSS SVG sanitiser that could ensure that the SVGs were safe to display directly in the browser.

Oct 22 2024, 5:29 PM · Proposal, Thumbor, MediaWiki-File-management, Commons, Wikimedia-SVG-rendering

Oct 21 2024

Bawolff added a comment to T377222: Don’t use raw HTML messages in safe mode.

Also this seems more like a feature request than a security issue. Maybe this should be made public so a broader group can comment on it.

Oct 21 2024, 8:59 PM · MW-1.44-notes (1.44.0-wmf.4; 2024-11-19), SecTeam-Processed, Vuln-XSS, Vuln-Misconfiguration, I18n, MediaWiki-Internationalization, Security, Security-Team
Bawolff added a comment to T377222: Don’t use raw HTML messages in safe mode.

I feel like safemode would be difficult to use as a security feature. Its not sticky, users would have to manually type in the url of every page. edit: appearently this is a user preference now, which maybe changes things with regards to how much it makes sense as a security feature.

Oct 21 2024, 5:10 PM · MW-1.44-notes (1.44.0-wmf.4; 2024-11-19), SecTeam-Processed, Vuln-XSS, Vuln-Misconfiguration, I18n, MediaWiki-Internationalization, Security, Security-Team

Oct 16 2024

Bawolff updated subscribers of T377168: XSS - codesearch.wmcloud.org.
Oct 16 2024, 10:59 PM · Patch-For-Review, SecTeam-Processed, cloud-services-team, VPS-project-Codesearch, Vuln-XSS, Security, Security-Team
Bawolff added a comment to T377168: XSS - codesearch.wmcloud.org.

Should i just submit a patch to gerrit? This is on *.wmcloud.org, so its not in the same domain as real sites, and thus XSS isn't that bad.

Oct 16 2024, 10:22 PM · Patch-For-Review, SecTeam-Processed, cloud-services-team, VPS-project-Codesearch, Vuln-XSS, Security, Security-Team
Bawolff added a comment to T377168: XSS - codesearch.wmcloud.org.

I am unable to reproduce this on stock hound. It might not be an upstream issue

Oct 16 2024, 10:00 PM · Patch-For-Review, SecTeam-Processed, cloud-services-team, VPS-project-Codesearch, Vuln-XSS, Security, Security-Team

Oct 15 2024

Bawolff added a comment to T377168: XSS - codesearch.wmcloud.org.

Is there anything we should do in downstream? Maybe make a strict CSP to minimize the impact? I can try to patch our setup but that's going to take a bit of time.

Oct 15 2024, 8:18 PM · Patch-For-Review, SecTeam-Processed, cloud-services-team, VPS-project-Codesearch, Vuln-XSS, Security, Security-Team
Bawolff added a comment to T377168: XSS - codesearch.wmcloud.org.

Payloads works - doubled in the same vulnerable param (etc as mentioned above):
https://codesearch.wmcloud.org/search/?q=poc%3Cscript%3Ealert(window.origin)%3C/script%3E%3Cscript%3Ealert(document.domain)%3C/script%3E&files=asd&excludeFiles=test&repos=test

Oct 15 2024, 8:14 PM · Patch-For-Review, SecTeam-Processed, cloud-services-team, VPS-project-Codesearch, Vuln-XSS, Security, Security-Team
Bawolff added a comment to T377168: XSS - codesearch.wmcloud.org.

To me, it looks unlikely a csp policy added at a proxy layer would help, unless it was hash or nonce based (or disabled js entirely) which would normally require application changes, since this is injecting into a valid script tag (as opposed to being an html injection)

Oct 15 2024, 8:08 PM · Patch-For-Review, SecTeam-Processed, cloud-services-team, VPS-project-Codesearch, Vuln-XSS, Security, Security-Team

Oct 8 2024

Bawolff added a comment to T376564: Scribunto should provide a bulk ifexists check.

The initial discussion was around pages using <translate> on commons, where the translated version was using twice as many checks because it needed to check both english and whatever lang it was translated into.

Oct 8 2024, 12:47 AM · User-notice, Patch-For-Review, Scribunto

Oct 6 2024

Pppery awarded T376564: Scribunto should provide a bulk ifexists check a Like token.
Oct 6 2024, 4:35 PM · User-notice, Patch-For-Review, Scribunto
Bawolff created T376564: Scribunto should provide a bulk ifexists check.
Oct 6 2024, 10:41 AM · User-notice, Patch-For-Review, Scribunto

Sep 30 2024

Bawolff created T375990: Web installer should verify composer is up to date before doing the install.
Sep 30 2024, 3:48 AM · MediaWiki-Installer

Sep 13 2024

Bawolff added a comment to T323875: Turn edit summary hashtags into change tags.

I think Special:Tags is pretty scalable since the creation of the change_tag_def table.

Sep 13 2024, 6:06 AM · Campaigns-Product-Team, MediaWiki-Change-tagging

Sep 12 2024

Bawolff updated the task description for T374643: add hook to detect change in visibility (revdel) of log entries and files.
Sep 12 2024, 4:47 PM · Patch-For-Review, MediaWiki-Revision-deletion, MediaWiki-Core-Hooks
Bawolff updated the task description for T374643: add hook to detect change in visibility (revdel) of log entries and files.
Sep 12 2024, 4:47 PM · Patch-For-Review, MediaWiki-Revision-deletion, MediaWiki-Core-Hooks
Bawolff added a project to T374643: add hook to detect change in visibility (revdel) of log entries and files: MediaWiki-Revision-deletion.
Sep 12 2024, 4:44 PM · Patch-For-Review, MediaWiki-Revision-deletion, MediaWiki-Core-Hooks
Bawolff created T374643: add hook to detect change in visibility (revdel) of log entries and files.
Sep 12 2024, 4:44 PM · Patch-For-Review, MediaWiki-Revision-deletion, MediaWiki-Core-Hooks

Sep 10 2024

Bawolff added a comment to T323875: Turn edit summary hashtags into change tags.

Just FYI, I started an extension to do something like this https://www.mediawiki.org/wiki/Extension:Hashtags . The extension is not necessarily aimed towards wikimedia. I personally believe that hashtags being ad-hoc (Be bold!) is where their primary value proposition is, but there is a config option in the extension to make it only work with specific hashtags.

Sep 10 2024, 4:52 AM · Campaigns-Product-Team, MediaWiki-Change-tagging

Sep 5 2024

Bawolff added a comment to T343497: Making it possible for users with the changetags permission to remove tags from deleted revisions.

There is the deleteTag.php maintenance script which bypasses the 5000 limit, but obviously regular wiki users cannot use it.

Sep 5 2024, 6:53 PM · MediaWiki-Change-tagging

Aug 31 2024

Bawolff added a comment to T371849: OATHAuth use virtual error when using the web updater.

The problem is DatabaseUpdater::loadExtensions() does not set Installer::$virtualDomains which is in turn used to construct the loadbalancer during update via installer.

Aug 31 2024, 5:14 PM · MediaWiki-Installer, MW-1.42-release, MediaWiki-extensions-OATHAuth
Bawolff renamed T371849: OATHAuth use virtual error when using the web updater from OATHAuth use virtual error to OATHAuth use virtual error when using the web updater.
Aug 31 2024, 4:40 PM · MediaWiki-Installer, MW-1.42-release, MediaWiki-extensions-OATHAuth
Bawolff added a comment to T371849: OATHAuth use virtual error when using the web updater.

I can confirm that I can reproduce this locally on the web updater, with no special configuration other then enabling OATHAuth

Aug 31 2024, 4:39 PM · MediaWiki-Installer, MW-1.42-release, MediaWiki-extensions-OATHAuth
Bawolff added a comment to T371849: OATHAuth use virtual error when using the web updater.

I asked the user to try the command line updater, and it worked, so i guess its specific to web installer. (Its unclear if all the other posts were for the web installer. I assumed they were using command line, but maybe that was a bad assumption by me. I also got the impression that some of them were during normal operation, not update, but maybe i was wrong)

Aug 31 2024, 4:17 PM · MediaWiki-Installer, MW-1.42-release, MediaWiki-extensions-OATHAuth
Bawolff added a comment to T371849: OATHAuth use virtual error when using the web updater.

Talking with one of the affected users from discord, I got them to var_dump( \ExtensionRegistry::getInstance()->getAttribute( 'DatabaseVirtualDomains' ) ) at time of making the DB select, and \ExtensionRegistry::getInstance()->getAttribute( 'DatabaseVirtualDomains' ) returned an empty array. Which is kind of weird, it suggests that the issue isn't DB code at all, but extension.json isn't registering the virtual domain

Aug 31 2024, 4:12 PM · MediaWiki-Installer, MW-1.42-release, MediaWiki-extensions-OATHAuth
Bawolff added a comment to T371849: OATHAuth use virtual error when using the web updater.

Another potential theory is that somehow the DBLoadBalancerFactoryConfigBuilder service gets constructed prior to all extensions being loaded (thus having the wrong arguments).

Aug 31 2024, 3:55 PM · MediaWiki-Installer, MW-1.42-release, MediaWiki-extensions-OATHAuth

Aug 30 2024

Bawolff added a comment to T117618: Add restrictive CSP to upload.wikimedia.org.

If you're interested in making the existing SVG filter more robust, by all means write a patch

Aug 30 2024, 6:30 PM · Patch-For-Review, Traffic, ContentSecurityPolicy, WMF-General-or-Unknown, Security-Team

Aug 29 2024

Bawolff added a comment to T117618: Add restrictive CSP to upload.wikimedia.org.

our svg upload filters are sketchy,

Could you describe where our upload filter will accept absolute resource references? wouldn't it be better to avoid this directly?

Aug 29 2024, 4:18 PM · Patch-For-Review, Traffic, ContentSecurityPolicy, WMF-General-or-Unknown, Security-Team
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy