Multiple directory traversal vulnerabilities in (1) languages/Language.php and (2) includes/StubObject.php in MediaWiki 1.8.0 and other versions before 1.16.2, when running on Windows and possibly Novell Netware, allow remote attackers to include and execute arbitrary local PHP files via vectors related to a crafted language file and the Language::factory function.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:24
Type | Values Removed | Values Added |
---|---|---|
References | () http://download.wikimedia.org/mediawiki/1.16/mediawiki-1.16.2.patch.gz - Patch | |
References | () http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-February/000095.html - Patch | |
References | () http://osvdb.org/70798 - | |
References | () http://osvdb.org/70799 - | |
References | () http://www.openwall.com/lists/oss-security/2011/02/01/4 - | |
References | () http://www.openwall.com/lists/oss-security/2011/02/03/3 - | |
References | () http://www.vupen.com/english/advisories/2011/0273 - Vendor Advisory | |
References | () https://bugzilla.wikimedia.org/show_bug.cgi?id=27094 - |
Information
Published : 2011-02-04 01:00
Updated : 2024-11-21 01:24
NVD link : CVE-2011-0537
Mitre link : CVE-2011-0537
CVE.ORG link : CVE-2011-0537
JSON object : View
Products Affected
mediawiki
- mediawiki
microsoft
- windows
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')