MediaWiki 1.22.x before 1.22.2, 1.21.x before 1.21.5, and 1.19.x before 1.19.11, when DjVu or PDF file upload support is enabled, allows remote attackers to execute arbitrary commands via shell metacharacters in (1) the page parameter to includes/media/DjVu.php; (2) the w parameter (aka width field) to thumb.php, which is not properly handled by includes/media/PdfHandler_body.php; and possibly unspecified vectors in (3) includes/media/Bitmap.php and (4) includes/media/ImageHandler.php.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2891-1 | mediawiki security update |
Debian DSA |
DSA-2891-2 | mediawiki regression update |
Debian DSA |
DSA-2891-3 | mediawiki regression update |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T09:50:09.575Z
Reserved: 2014-01-19T00:00:00
Link: CVE-2014-1610
No data.
Status : Deferred
Published: 2014-01-30T23:55:02.413
Modified: 2025-04-11T00:51:21.963
Link: CVE-2014-1610
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA