Vulnerabilities > CVE-2005-4031 - Remote Code Execution vulnerability in MediaWiki User Language
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Eval injection vulnerability in MediaWiki 1.5.x before 1.5.3 allows remote attackers to execute arbitrary PHP code via the "user language option," which is used as part of a dynamic class name that is processed using the eval function. This vulnerability is addressed in the following product release: MediaWiki, MediaWiki, 1.5.3
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 8 |
Nessus
NASL family | CGI abuses |
NASL id | MEDIAWIKI_CODE_EXEC.NASL |
description | The version of MediaWiki running on the remote host is affected by a remote command execution vulnerability due to improper sanitization of user-supplied input. An unauthenticated, remote attacker can execute arbitrary PHP and shell commands on the remote host, subject to the privileges of the web server user id. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 20255 |
published | 2005-12-05 |
reporter | This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/20255 |
title | MediaWiki Language Option eval() Function Arbitrary PHP Code Execution |