First published: Tue Dec 06 2005(Updated: )
Eval injection vulnerability in MediaWiki 1.5.x before 1.5.3 allows remote attackers to execute arbitrary PHP code via the "user language option," which is used as part of a dynamic class name that is processed using the eval function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MediaWiki MediaWiki | =1.5.1 | |
MediaWiki MediaWiki | =1.5.2 | |
MediaWiki MediaWiki | =1.5_alpha2 | |
MediaWiki MediaWiki | =1.5.0 | |
MediaWiki MediaWiki | =1.5_beta3 | |
MediaWiki MediaWiki | =1.5_beta1 | |
MediaWiki MediaWiki | =1.5_beta2 | |
MediaWiki MediaWiki | =1.5_alpha1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.