Arbitrary File Read Affecting mediawiki/core package, versions <1.35.5>=1.36.0-rc.0, <1.36.3>=1.37.0-rc.0, 1.37.1


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.29% (69th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Arbitrary File Read vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PHP-MEDIAWIKICORE-6056537
  • published17 Dec 2021
  • disclosed17 Dec 2021
  • creditUnknown

Introduced: 17 Dec 2021

CVE-2021-44858  (opens in a new tab)
CWE-22  (opens in a new tab)

How to fix?

Upgrade mediawiki/core to version 1.35.5, 1.36.3 or higher.

Overview

mediawiki/core is a Free software wiki application developed by the Wikimedia Foundation and others.

Note: This package is not maintained on Packagist anymore, but newer releases exist.

Affected versions of this package are vulnerable to Arbitrary File Read. It is possible to use action=mcrundo followed by action=mcrrestore to replace and read the content of any arbitrary page. This applies to any public wiki or a private wiki that has at least one page set in $wgWhitelistRead.

NOTE: This vulnerability has also been identified as: CVE-2021-44857

CVSS Scores

version 3.1