MediaWiki thumb.php 'w' Parameter Remote Shell Command Injection

high Nessus Plugin ID 72618

Synopsis

The remote web server contains an application that is affected by a remote command injection vulnerability.

Description

The version of MediaWiki running on the remote host is affected by a remote command injection vulnerability due to a failure to properly sanitize user-supplied input to the 'w' parameter in the 'thumb.php' script. A remote, unauthenticated attacker can exploit this issue to execute arbitrary commands and/or execute arbitrary code on the remote host.

Note that the application is also affected by an additional command injection issue. However, Nessus has not tested for this additional issue.

Note also that PDF file upload support and the PdfHandler extension must be enabled in order to exploit this issue.

Solution

Upgrade to MediaWiki 1.19.11 / 1.21.5 / 1.22.2 or later, and update the PdfHandler extension to the latest available version.

See Also

https://seclists.org/fulldisclosure/2014/Feb/6

http://www.nessus.org/u?f8ca1fc8

https://www.mediawiki.org/wiki/Release_notes/1.19

https://www.mediawiki.org/wiki/Release_notes/1.21

https://www.mediawiki.org/wiki/Release_notes/1.22

http://www.nessus.org/u?92483abd

Plugin Details

Severity: High

ID: 72618

File Name: mediawiki_thumb_rce.nasl

Version: 1.13

Type: remote

Family: CGI abuses

Published: 2/21/2014

Updated: 6/5/2024

Configuration: Enable thorough checks

Supported Sensors: Nessus

Enable CGI Scanning: true

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Medium

Base Score: 6

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:S/C:P/I:P/A:P

CVSS Score Source: CVE-2014-1610

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 8.2

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mediawiki:mediawiki

Required KB Items: www/PHP, installed_sw/MediaWiki

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Patch Publication Date: 1/28/2014

Vulnerability Publication Date: 1/28/2014

Exploitable With

Core Impact

Metasploit (MediaWiki Thumb.php Remote Command Execution)

Elliot (MediaWiki thumb.php page Parameter Remote Shell Command Injection)

Reference Information

CVE: CVE-2014-1610

BID: 65223