First published: Thu Jan 30 2014(Updated: )
MediaWiki 1.22.x before 1.22.2, 1.21.x before 1.21.5, and 1.19.x before 1.19.11, when DjVu or PDF file upload support is enabled, allows remote attackers to execute arbitrary commands via shell metacharacters in (1) the page parameter to includes/media/DjVu.php; (2) the w parameter (aka width field) to thumb.php, which is not properly handled by includes/media/PdfHandler_body.php; and possibly unspecified vectors in (3) includes/media/Bitmap.php and (4) includes/media/ImageHandler.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MediaWiki | =1.19.0 | |
MediaWiki | =1.19.1 | |
MediaWiki | =1.19.2 | |
MediaWiki | =1.19.3 | |
MediaWiki | =1.19.4 | |
MediaWiki | =1.19.5 | |
MediaWiki | =1.19.6 | |
MediaWiki | =1.19.7 | |
MediaWiki | =1.19.8 | |
MediaWiki | =1.19.9 | |
MediaWiki | =1.19.10 | |
MediaWiki | =1.21.1 | |
MediaWiki | =1.21.2 | |
MediaWiki | =1.21.3 | |
MediaWiki | =1.21.4 | |
MediaWiki | =1.22.0 | |
MediaWiki | =1.22.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1610 is considered a critical vulnerability due to its potential to allow remote command execution.
To fix CVE-2014-1610, you should upgrade MediaWiki to version 1.22.2, 1.21.5, or 1.19.11 or later.
CVE-2014-1610 affects MediaWiki versions 1.22.0, 1.22.1, 1.21.0 to 1.21.4, and 1.19.0 to 1.19.10.
The potential impacts of CVE-2014-1610 include remote attackers executing arbitrary commands on the server.
If you are using MediaWiki versions earlier than 1.22.2, 1.21.5, or 1.19.11 with DjVu or PDF support enabled, your installation is vulnerable to CVE-2014-1610.