Vulnerabilities > CVE-2005-4031 - Remote Code Execution vulnerability in MediaWiki User Language

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
mediawiki
nessus

Summary

Eval injection vulnerability in MediaWiki 1.5.x before 1.5.3 allows remote attackers to execute arbitrary PHP code via the "user language option," which is used as part of a dynamic class name that is processed using the eval function. This vulnerability is addressed in the following product release: MediaWiki, MediaWiki, 1.5.3

Nessus

NASL familyCGI abuses
NASL idMEDIAWIKI_CODE_EXEC.NASL
descriptionThe version of MediaWiki running on the remote host is affected by a remote command execution vulnerability due to improper sanitization of user-supplied input. An unauthenticated, remote attacker can execute arbitrary PHP and shell commands on the remote host, subject to the privileges of the web server user id.
last seen2020-06-01
modified2020-06-02
plugin id20255
published2005-12-05
reporterThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/20255
titleMediaWiki Language Option eval() Function Arbitrary PHP Code Execution