UBUNTU-CVE-2014-1610

Source
https://ubuntu.com/security/CVE-2014-1610
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2014/UBUNTU-CVE-2014-1610.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2014-1610
Related
Published
2014-01-30T23:55:00Z
Modified
2025-01-13T10:21:05Z
Summary
[none]
Details

MediaWiki 1.22.x before 1.22.2, 1.21.x before 1.21.5, and 1.19.x before 1.19.11, when DjVu or PDF file upload support is enabled, allows remote attackers to execute arbitrary commands via shell metacharacters in (1) the page parameter to includes/media/DjVu.php; (2) the w parameter (aka width field) to thumb.php, which is not properly handled by includes/media/PdfHandler_body.php; and possibly unspecified vectors in (3) includes/media/Bitmap.php and (4) includes/media/ImageHandler.php.

References

Affected packages

Ubuntu:14.04:LTS / mediawiki

Package

Name
mediawiki
Purl
pkg:deb/ubuntu/mediawiki@1:1.19.11+dfsg-1?arch=source&distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:1.19.11+dfsg-1

Affected versions

1:1.*

1:1.19.8+dfsg-1
1:1.19.8+dfsg-2
1:1.19.8+dfsg-2.1
1:1.19.8+dfsg-2.2
1:1.19.9+dfsg-2
1:1.19.10+dfsg-1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "medium",
    "binaries": [
        {
            "binary_version": "1:1.19.11+dfsg-1",
            "binary_name": "mediawiki"
        },
        {
            "binary_version": "1:1.19.11+dfsg-1",
            "binary_name": "mediawiki-classes"
        }
    ]
}