Multiple directory traversal vulnerabilities in (1) languages/Language.php and (2) includes/StubObject.php in MediaWiki 1.8.0 and other versions before 1.16.2, when running on Windows and possibly Novell Netware, allow remote attackers to include and execute arbitrary local PHP files via vectors related to a crafted language file and the Language::factory function.
                
            References
                    Configurations
                    Configuration 1 (hide)
| AND | 
 
 | 
History
                    21 Nov 2024, 01:24
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://download.wikimedia.org/mediawiki/1.16/mediawiki-1.16.2.patch.gz - Patch | |
| References | () http://lists.wikimedia.org/pipermail/mediawiki-announce/2011-February/000095.html - Patch | |
| References | () http://osvdb.org/70798 - | |
| References | () http://osvdb.org/70799 - | |
| References | () http://www.openwall.com/lists/oss-security/2011/02/01/4 - | |
| References | () http://www.openwall.com/lists/oss-security/2011/02/03/3 - | |
| References | () http://www.vupen.com/english/advisories/2011/0273 - Vendor Advisory | |
| References | () https://bugzilla.wikimedia.org/show_bug.cgi?id=27094 - | 
Information
                Published : 2011-02-04 01:00
Updated : 2025-04-11 00:51
NVD link : CVE-2011-0537
Mitre link : CVE-2011-0537
CVE.ORG link : CVE-2011-0537
JSON object : View
Products Affected
                mediawiki
- mediawiki
microsoft
- windows
CWE
                
                    
                        
                        CWE-22
                        
            Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
