Arbitrary File Read Affecting mediawiki/core package, versions <1.35.5 >=1.36.0-rc.0, <1.36.3 >=1.37.0-rc.0, 1.37.1
Snyk CVSS
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PHP-MEDIAWIKICORE-2321424
- published 17 Dec 2021
- disclosed 17 Dec 2021
- credit Unknown
Introduced: 17 Dec 2021
CVE-2021-44857 Open this link in a new tabHow to fix?
Upgrade mediawiki/core
to version 1.35.5, 1.36.3 or higher.
Overview
mediawiki/core is a Free software wiki application developed by the Wikimedia Foundation and others.
Note: This package is not maintained on Packagist
anymore, but newer releases exist.
Affected versions of this package are vulnerable to Arbitrary File Read. It is possible to use action=mcrundo
followed by action=mcrrestore
to replace and read the content of any arbitrary page. This applies to any public wiki or a private wiki that has at least one page set in $wgWhitelistRead
.
NOTE: This vulnerability has also been identified as: CVE-2021-44858