Arbitrary File Read Affecting mediawiki/core package, versions <1.35.5 >=1.36.0-rc.0, <1.36.3 >=1.37.0-rc.0, 1.37.1


0.0
high

Snyk CVSS

    Attack Complexity Low
    Integrity High

    Threat Intelligence

    EPSS 0.07% (29th percentile)
Expand this section
NVD
6.5 medium
Expand this section
Red Hat
6.5 medium

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-PHP-MEDIAWIKICORE-2321424
  • published 17 Dec 2021
  • disclosed 17 Dec 2021
  • credit Unknown

How to fix?

Upgrade mediawiki/core to version 1.35.5, 1.36.3 or higher.

Overview

mediawiki/core is a Free software wiki application developed by the Wikimedia Foundation and others.

Note: This package is not maintained on Packagist anymore, but newer releases exist.

Affected versions of this package are vulnerable to Arbitrary File Read. It is possible to use action=mcrundo followed by action=mcrrestore to replace and read the content of any arbitrary page. This applies to any public wiki or a private wiki that has at least one page set in $wgWhitelistRead.

NOTE: This vulnerability has also been identified as: CVE-2021-44858