PHP remote file inclusion vulnerability in MediaWikiParserTest.php in MediaWiki 1.16 beta, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via unspecified vectors.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://openwall.com/lists/oss-security/2010/07/29/4 | mailing list |
http://lists.wikimedia.org/pipermail/mediawiki-announce/2010-July/000092.html | mailing list patch vendor advisory |