Summary: | <www-apps/mediawiki-{1.19.11,1.21.5,1.22.2}: remote code execution if file upload support for DjVu or PDF files is enabled (CVE-2014-1610) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Alex Xu (Hello71) <alex_y_xu> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | major | CC: | web-apps |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | C1 [glsa] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 498064 | ||
Bug Blocks: |
Description
Alex Xu (Hello71)
2014-01-28 21:46:11 UTC
Bumped. 1.20.x was EOL'd, and was pruned from the tree due to a previous security issue. Arches, please test and stable: =www-apps/mediawiki-{1.19.11,1.21.5} Target arches: amd64 ppc x86 amd64 stable x86 stable CVE-2014-1610 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1610): MediaWiki 1.22.x before 1.22.2, 1.21.x before 1.21.5 and 1.19.x before 1.19.11, when DjVu or PDF file upload support is enabled, allows remote authenticated users to execute arbitrary commands via shell metacharacters in (1) the page parameter to includes/media/DjVu.php; unspecified vectors in (2) includes/media/PdfHandler_body.php; and possibly unspecified vectors in (3) includes/media/Bitmap.php and (4) includes/media/ImageHandler.php. ppc stable. Maintainer(s), please cleanup. Security, please add it to the existing request, or file a new one. glsa request filed. Arches and Mainter(s), Thank you for your work. This issue was resolved and addressed in GLSA 201502-04 at http://security.gentoo.org/glsa/glsa-201502-04.xml by GLSA coordinator Kristian Fiskerstrand (K_F). |