MediaWiki Language Option eval() Function Arbitrary PHP Code Execution

high Nessus Plugin ID 20255

Synopsis

The remote web server hosts a PHP script that is affected by an arbitrary command execution vulnerability.

Description

The version of MediaWiki running on the remote host is affected by a remote command execution vulnerability due to improper sanitization of user-supplied input. An unauthenticated, remote attacker can execute arbitrary PHP and shell commands on the remote host, subject to the privileges of the web server user id.

Solution

Upgrade to MediaWiki 1.5.3 or later.

See Also

http://www.nessus.org/u?5d68d6da

Plugin Details

Severity: High

ID: 20255

File Name: mediawiki_code_exec.nasl

Version: 1.27

Type: remote

Family: CGI abuses

Published: 12/5/2005

Updated: 6/5/2024

Configuration: Enable thorough checks

Supported Sensors: Nessus

Enable CGI Scanning: true

Risk Information

VPR

Risk Factor: Medium

Score: 5.8

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:mediawiki:mediawiki

Required KB Items: www/PHP, installed_sw/MediaWiki

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: No exploit is required

Vulnerability Publication Date: 12/4/2005

Reference Information

CVE: CVE-2005-4031

BID: 15703