Vulnerability Details : CVE-2005-0536
Directory traversal vulnerability in MediaWiki 1.3.x before 1.3.11 and 1.4 beta before 1.4 rc1 allows remote attackers to delete arbitrary files or determine file existence via a parameter related to image deletion.
Vulnerability category: Directory traversal
Products affected by CVE-2005-0536
- cpe:2.3:a:mediawiki:mediawiki:1.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:mediawiki:mediawiki:1.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:mediawiki:mediawiki:1.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:mediawiki:mediawiki:1.3.6:*:*:*:*:*:*:*
- cpe:2.3:a:mediawiki:mediawiki:1.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:mediawiki:mediawiki:1.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:mediawiki:mediawiki:1.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:mediawiki:mediawiki:1.3.10:*:*:*:*:*:*:*
- cpe:2.3:a:mediawiki:mediawiki:1.3.7:*:*:*:*:*:*:*
- cpe:2.3:a:mediawiki:mediawiki:1.3.8:*:*:*:*:*:*:*
- cpe:2.3:a:mediawiki:mediawiki:1.4_beta1:*:*:*:*:*:*:*
- cpe:2.3:a:mediawiki:mediawiki:1.4_beta3:*:*:*:*:*:*:*
- cpe:2.3:a:mediawiki:mediawiki:1.4_beta4:*:*:*:*:*:*:*
- cpe:2.3:a:mediawiki:mediawiki:1.4_beta5:*:*:*:*:*:*:*
- cpe:2.3:a:mediawiki:mediawiki:1.4_beta6:*:*:*:*:*:*:*
- cpe:2.3:a:mediawiki:mediawiki:1.3.9:*:*:*:*:*:*:*
- cpe:2.3:a:mediawiki:mediawiki:1.4_beta2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2005-0536
0.99%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 82 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2005-0536
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
References for CVE-2005-0536
-
http://sourceforge.net/project/shownotes.php?release_id=307067
Page not found - SourceForge.netPatch
-
http://securitytracker.com/id?1013260
GoDaddy Domain Name SearchPatch;Vendor Advisory
-
http://www.gentoo.org/security/en/glsa/glsa-200502-33.xml
MediaWiki: Multiple vulnerabilities (GLSA 200502-33) — Gentoo securityPatch;Vendor Advisory
Jump to