Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2014-1610


MediaWiki 1.22.x before 1.22.2, 1.21.x before 1.21.5, and 1.19.x before 1.19.11, when DjVu or PDF file upload support is enabled, allows remote attackers to execute arbitrary commands via shell metacharacters in (1) the page parameter to includes/media/DjVu.php; (2) the w parameter (aka width field) to thumb.php, which is not properly handled by includes/media/PdfHandler_body.php; and possibly unspecified vectors in (3) includes/media/Bitmap.php and (4) includes/media/ImageHandler.php.


Published

2014-01-30T23:55:02.413

Last Modified

2025-04-11T00:51:21.963

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 6.0 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:S/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: SINGLE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

6.8

Impact Score

6.4

Weaknesses
  • Type: Primary
    CWE-20

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application mediawiki mediawiki 1.19.0 Yes
Application mediawiki mediawiki 1.19.1 Yes
Application mediawiki mediawiki 1.19.2 Yes
Application mediawiki mediawiki 1.19.3 Yes
Application mediawiki mediawiki 1.19.4 Yes
Application mediawiki mediawiki 1.19.5 Yes
Application mediawiki mediawiki 1.19.6 Yes
Application mediawiki mediawiki 1.19.7 Yes
Application mediawiki mediawiki 1.19.8 Yes
Application mediawiki mediawiki 1.19.9 Yes
Application mediawiki mediawiki 1.19.10 Yes
Application mediawiki mediawiki 1.21.1 Yes
Application mediawiki mediawiki 1.21.2 Yes
Application mediawiki mediawiki 1.21.3 Yes
Application mediawiki mediawiki 1.21.4 Yes
Application mediawiki mediawiki 1.22.0 Yes
Application mediawiki mediawiki 1.22.1 Yes

References