CVE-2014-1610

Source
https://nvd.nist.gov/vuln/detail/CVE-2014-1610
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2014-1610.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2014-1610
Related
Published
2014-01-30T23:55:02Z
Modified
2024-12-29T17:00:04Z
Summary
[none]
Details

MediaWiki 1.22.x before 1.22.2, 1.21.x before 1.21.5, and 1.19.x before 1.19.11, when DjVu or PDF file upload support is enabled, allows remote attackers to execute arbitrary commands via shell metacharacters in (1) the page parameter to includes/media/DjVu.php; (2) the w parameter (aka width field) to thumb.php, which is not properly handled by includes/media/PdfHandler_body.php; and possibly unspecified vectors in (3) includes/media/Bitmap.php and (4) includes/media/ImageHandler.php.

References

Affected packages

Debian:11 / mediawiki

Package

Name
mediawiki
Purl
pkg:deb/debian/mediawiki?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:1.19.11+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / mediawiki

Package

Name
mediawiki
Purl
pkg:deb/debian/mediawiki?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:1.19.11+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}