fkie_cve-2005-0536
Vulnerability from fkie_nvd
Published
2005-05-02 04:00
Modified
2024-11-20 23:55
Severity ?
Summary
Directory traversal vulnerability in MediaWiki 1.3.x before 1.3.11 and 1.4 beta before 1.4 rc1 allows remote attackers to delete arbitrary files or determine file existence via a parameter related to image deletion.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://secunia.com/advisories/14360 | Patch, Vendor Advisory | |
cve@mitre.org | http://securitytracker.com/id?1013260 | Patch, Vendor Advisory | |
cve@mitre.org | http://sourceforge.net/project/shownotes.php?release_id=307067 | Patch | |
cve@mitre.org | http://www.gentoo.org/security/en/glsa/glsa-200502-33.xml | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/14360 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1013260 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://sourceforge.net/project/shownotes.php?release_id=307067 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.gentoo.org/security/en/glsa/glsa-200502-33.xml | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mediawiki | mediawiki | 1.3.0 | |
mediawiki | mediawiki | 1.3.1 | |
mediawiki | mediawiki | 1.3.2 | |
mediawiki | mediawiki | 1.3.3 | |
mediawiki | mediawiki | 1.3.4 | |
mediawiki | mediawiki | 1.3.5 | |
mediawiki | mediawiki | 1.3.6 | |
mediawiki | mediawiki | 1.3.7 | |
mediawiki | mediawiki | 1.3.8 | |
mediawiki | mediawiki | 1.3.9 | |
mediawiki | mediawiki | 1.3.10 | |
mediawiki | mediawiki | 1.4_beta1 | |
mediawiki | mediawiki | 1.4_beta2 | |
mediawiki | mediawiki | 1.4_beta3 | |
mediawiki | mediawiki | 1.4_beta4 | |
mediawiki | mediawiki | 1.4_beta5 | |
mediawiki | mediawiki | 1.4_beta6 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:mediawiki:mediawiki:1.3.0:*:*:*:*:*:*:*", matchCriteriaId: "30F54837-5004-4D10-B3B0-502CED4F6592", vulnerable: true, }, { criteria: "cpe:2.3:a:mediawiki:mediawiki:1.3.1:*:*:*:*:*:*:*", matchCriteriaId: "A09F36C1-CBC0-489E-B62D-4590A2E5A4E5", vulnerable: true, }, { criteria: "cpe:2.3:a:mediawiki:mediawiki:1.3.2:*:*:*:*:*:*:*", matchCriteriaId: "A9F0067D-534A-4238-A244-D92A73845432", vulnerable: true, }, { criteria: "cpe:2.3:a:mediawiki:mediawiki:1.3.3:*:*:*:*:*:*:*", matchCriteriaId: "3BEC422E-49BC-41D4-9F71-B834D4108EF3", vulnerable: true, }, { criteria: "cpe:2.3:a:mediawiki:mediawiki:1.3.4:*:*:*:*:*:*:*", matchCriteriaId: "6D854161-28AA-4386-B90A-97F9692CE37F", vulnerable: true, }, { criteria: "cpe:2.3:a:mediawiki:mediawiki:1.3.5:*:*:*:*:*:*:*", matchCriteriaId: "D5A0FA49-99DC-4691-968F-6AEB76B74370", vulnerable: true, }, { criteria: "cpe:2.3:a:mediawiki:mediawiki:1.3.6:*:*:*:*:*:*:*", matchCriteriaId: "2A0C6A2C-992B-45A0-8E0C-1AE983881337", vulnerable: true, }, { criteria: "cpe:2.3:a:mediawiki:mediawiki:1.3.7:*:*:*:*:*:*:*", matchCriteriaId: "292A77C7-8C7B-4F3A-B7FD-3505A9F37E4B", vulnerable: true, }, { criteria: "cpe:2.3:a:mediawiki:mediawiki:1.3.8:*:*:*:*:*:*:*", matchCriteriaId: "C77FC97A-3BB2-4AA5-B0D6-C0D1FBEA5FD4", vulnerable: true, }, { criteria: "cpe:2.3:a:mediawiki:mediawiki:1.3.9:*:*:*:*:*:*:*", matchCriteriaId: "2C9393EF-083A-4662-BC7A-89979C2B8546", vulnerable: true, }, { criteria: "cpe:2.3:a:mediawiki:mediawiki:1.3.10:*:*:*:*:*:*:*", matchCriteriaId: "F9DE6A4E-6BCE-499E-B017-1E0F8D1F65B8", vulnerable: true, }, { criteria: "cpe:2.3:a:mediawiki:mediawiki:1.4_beta1:*:*:*:*:*:*:*", matchCriteriaId: "80E70F32-2F26-4836-8A4F-0A0B06EAD371", vulnerable: true, }, { criteria: "cpe:2.3:a:mediawiki:mediawiki:1.4_beta2:*:*:*:*:*:*:*", matchCriteriaId: "EE506B8C-245E-4A7E-A24C-FABB1D4531EF", vulnerable: true, }, { criteria: "cpe:2.3:a:mediawiki:mediawiki:1.4_beta3:*:*:*:*:*:*:*", matchCriteriaId: "934382C1-088A-4AEE-A71A-E9802AC9C1A4", vulnerable: true, }, { criteria: "cpe:2.3:a:mediawiki:mediawiki:1.4_beta4:*:*:*:*:*:*:*", matchCriteriaId: "D1A9028E-1BDE-4BA0-A479-7A30020331D0", vulnerable: true, }, { criteria: "cpe:2.3:a:mediawiki:mediawiki:1.4_beta5:*:*:*:*:*:*:*", matchCriteriaId: "5D02E4C1-2BA7-4BC0-9C11-D0F74181DF82", vulnerable: true, }, { criteria: "cpe:2.3:a:mediawiki:mediawiki:1.4_beta6:*:*:*:*:*:*:*", matchCriteriaId: "728E2852-5658-4DCC-AF1E-718B292F06C1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Directory traversal vulnerability in MediaWiki 1.3.x before 1.3.11 and 1.4 beta before 1.4 rc1 allows remote attackers to delete arbitrary files or determine file existence via a parameter related to image deletion.", }, ], id: "CVE-2005-0536", lastModified: "2024-11-20T23:55:21.477", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2005-05-02T04:00:00.000", references: [ { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/14360", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://securitytracker.com/id?1013260", }, { source: "cve@mitre.org", tags: [ "Patch", ], url: "http://sourceforge.net/project/shownotes.php?release_id=307067", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200502-33.xml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://secunia.com/advisories/14360", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://securitytracker.com/id?1013260", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://sourceforge.net/project/shownotes.php?release_id=307067", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.gentoo.org/security/en/glsa/glsa-200502-33.xml", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.