RULE(RULE ID:333173)

Rule General Information
Release Date: 2021-03-26
Rule Name: MediaWiki Language Option PHP Code Execution Vulnerability (CVE-2005-4031)
Severity:
CVE ID:
Rule Protection Details
Description: There exists an arbitrary code execution vulnerability in MediaWiki. The flaw is caused by improper checking of the user supplied language option. An attacker can exploit this vulnerability to inject and execute arbitrary code on the vulnerable host. In an attack scenario where arbitrary code execution is attempted, the behaviour of the target is dependent on the intention of the intention of the malicious code. If such an attack is not executed successfully, the vulnerable application will not exhibit any abnormal behaviour.
Impact: An attacker can execute arbitrary code via a successful exploit in the context of the vulnerable software.
Affected OS: Windows, Linux, Others
Reference: SecurityFocusBID:15703
http://sourceforge.net/project/shownotes.php?group_id=34373&release_id=375755
http://www.kb.cert.org/vuls/id/392156
http://www.vupen.com/english/advisories/2005/2726
Solutions
The vendor has released upgrade patches to fix vulnerabilities, please visit:
http://prdownloads.sourceforge.net/wikipedia/mediawiki-1.5.3.tar.gz