CVE-2005-4031

Eval injection vulnerability in MediaWiki 1.5.x before 1.5.3 allows remote attackers to execute arbitrary PHP code via the "user language option," which is used as part of a dynamic class name that is processed using the eval function.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mediawiki:mediawiki:1.5.0:*:*:*:*:*:*:*
cpe:2.3:a:mediawiki:mediawiki:1.5.1:*:*:*:*:*:*:*
cpe:2.3:a:mediawiki:mediawiki:1.5.2:*:*:*:*:*:*:*
cpe:2.3:a:mediawiki:mediawiki:1.5_alpha1:*:*:*:*:*:*:*
cpe:2.3:a:mediawiki:mediawiki:1.5_alpha2:*:*:*:*:*:*:*
cpe:2.3:a:mediawiki:mediawiki:1.5_beta1:*:*:*:*:*:*:*
cpe:2.3:a:mediawiki:mediawiki:1.5_beta2:*:*:*:*:*:*:*
cpe:2.3:a:mediawiki:mediawiki:1.5_beta3:*:*:*:*:*:*:*

History

21 Nov 2024, 00:03

Type Values Removed Values Added
References () http://secunia.com/advisories/17866 - Patch, Vendor Advisory () http://secunia.com/advisories/17866 - Patch, Vendor Advisory
References () http://sourceforge.net/project/shownotes.php?group_id=34373&release_id=375755 - Patch () http://sourceforge.net/project/shownotes.php?group_id=34373&release_id=375755 - Patch
References () http://www.kb.cert.org/vuls/id/392156 - US Government Resource () http://www.kb.cert.org/vuls/id/392156 - US Government Resource
References () http://www.securityfocus.com/bid/15703 - Patch () http://www.securityfocus.com/bid/15703 - Patch
References () http://www.vupen.com/english/advisories/2005/2726 - () http://www.vupen.com/english/advisories/2005/2726 -

Information

Published : 2005-12-06 11:03

Updated : 2024-11-21 00:03


NVD link : CVE-2005-4031

Mitre link : CVE-2005-4031

CVE.ORG link : CVE-2005-4031


JSON object : View

Products Affected

mediawiki

  • mediawiki