Vulnerabilities > CVE-2005-4031 - Unspecified vulnerability in Mediawiki

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
mediawiki
nessus

Summary

Eval injection vulnerability in MediaWiki 1.5.x before 1.5.3 allows remote attackers to execute arbitrary PHP code via the "user language option," which is used as part of a dynamic class name that is processed using the eval function.

Nessus

NASL familyCGI abuses
NASL idMEDIAWIKI_CODE_EXEC.NASL
descriptionThe version of MediaWiki running on the remote host is affected by a remote command execution vulnerability due to improper sanitization of user-supplied input. An unauthenticated, remote attacker can execute arbitrary PHP and shell commands on the remote host, subject to the privileges of the web server user id.
last seen2020-06-01
modified2020-06-02
plugin id20255
published2005-12-05
reporterThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/20255
titleMediaWiki Language Option eval() Function Arbitrary PHP Code Execution