CVE-2023-29134
📋 TL;DR
This vulnerability in the Cargo extension for MediaWiki involves improper handling of backticks in the smartSplit function, potentially allowing attackers to execute arbitrary code or cause denial of service. It affects MediaWiki installations with the Cargo extension enabled. The vulnerability is particularly concerning because it could be exploited by users with edit permissions.
💻 Affected Systems
- MediaWiki Cargo extension
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete system compromise, data theft, or website defacement.
Likely Case
Denial of service through application crashes or limited code execution within the MediaWiki context.
If Mitigated
Minimal impact if proper input validation and security controls are implemented.
🎯 Exploit Status
Exploitation likely requires authenticated access with edit permissions.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Cargo extension patched in commits 895774, 898722, 900133
Vendor Advisory: https://phabricator.wikimedia.org/T331362
Restart Required: No
Instructions:
1. Update MediaWiki to version 1.39.4 or later. 2. Update Cargo extension to latest version. 3. Apply patches from provided Gerrit links if manual patching is needed.
🔧 Temporary Workarounds
Disable Cargo extension
allTemporarily disable the Cargo extension until patching is complete
Edit LocalSettings.php and comment out or remove 'wfLoadExtension( "Cargo" );'
Restrict edit permissions
allLimit who can edit pages to reduce attack surface
Configure MediaWiki permissions to restrict editing to trusted users only
🧯 If You Can't Patch
- Implement strict input validation for all user-provided content
- Deploy web application firewall rules to detect and block exploitation attempts
🔍 How to Verify
Check if Vulnerable:
Check MediaWiki version and Cargo extension version. If MediaWiki ≤ 1.39.3 with Cargo extension, you are vulnerable.
Check Version:
Check MediaWiki version in includes/DefaultSettings.php or via Special:Version page
Verify Fix Applied:
Verify MediaWiki version is ≥ 1.39.4 and Cargo extension has been updated with the referenced patches.
📡 Detection & Monitoring
Log Indicators:
- Unusual edit patterns with backticks
- Application errors related to smartSplit function
- Multiple failed parsing attempts
Network Indicators:
- Unusual POST requests to edit endpoints with backtick payloads
SIEM Query:
source="mediawiki.log" AND ("smartSplit" OR "backtick" OR "Cargo") AND (error OR exception)
🔗 References
- https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Cargo/+/895774
- https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Cargo/+/898722
- https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Cargo/+/900133
- https://phabricator.wikimedia.org/T331362
- https://phabricator.wikimedia.org/rECRG920f3c19a84175bcfe93f41ecf9f8cef32730f8e
- https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Cargo/+/895774
- https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Cargo/+/898722
- https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Cargo/+/900133
- https://phabricator.wikimedia.org/T331362
- https://phabricator.wikimedia.org/rECRG920f3c19a84175bcfe93f41ecf9f8cef32730f8e