First published: Thu Jan 30 2014(Updated: )
MediaWiki 1.22.x before 1.22.2, 1.21.x before 1.21.5, and 1.19.x before 1.19.11, when DjVu or PDF file upload support is enabled, allows remote attackers to execute arbitrary commands via shell metacharacters in (1) the page parameter to includes/media/DjVu.php; (2) the w parameter (aka width field) to thumb.php, which is not properly handled by includes/media/PdfHandler_body.php; and possibly unspecified vectors in (3) includes/media/Bitmap.php and (4) includes/media/ImageHandler.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
MediaWiki MediaWiki | =1.19.0 | |
MediaWiki MediaWiki | =1.19.1 | |
MediaWiki MediaWiki | =1.19.2 | |
MediaWiki MediaWiki | =1.19.3 | |
MediaWiki MediaWiki | =1.19.4 | |
MediaWiki MediaWiki | =1.19.5 | |
MediaWiki MediaWiki | =1.19.6 | |
MediaWiki MediaWiki | =1.19.7 | |
MediaWiki MediaWiki | =1.19.8 | |
MediaWiki MediaWiki | =1.19.9 | |
MediaWiki MediaWiki | =1.19.10 | |
MediaWiki MediaWiki | =1.21.1 | |
MediaWiki MediaWiki | =1.21.2 | |
MediaWiki MediaWiki | =1.21.3 | |
MediaWiki MediaWiki | =1.21.4 | |
MediaWiki MediaWiki | =1.22.0 | |
MediaWiki MediaWiki | =1.22.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.