← Volver a CVEs
CVE-2013-4301
N/ADescripcion
includes/resourceloader/ResourceLoaderContext.php in MediaWiki 1.19.x before 1.19.8, 1.20.x before 1.20.7, and 1.21.x before 1.21.2 allows remote attackers to obtain sensitive information via a "<" (open angle bracket) character in the lang parameter to w/load.php, which reveals the installation path in an error message.
Detalles CVE
Puntuacion CVSS v3.1N/A
Publicado10/27/2013
Ultima modificacion4/11/2025
Fuentenvd
Avistamientos honeypot0
Productos afectados
mediawiki:mediawiki
Debilidades (CWE)
CWE-200
Referencias
http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-September/000133.html(secalert@redhat.com)
http://osvdb.org/96913(secalert@redhat.com)
http://seclists.org/oss-sec/2013/q3/553(secalert@redhat.com)
http://secunia.com/advisories/54715(secalert@redhat.com)
https://bugzilla.wikimedia.org/show_bug.cgi?id=46332(secalert@redhat.com)
https://exchange.xforce.ibmcloud.com/vulnerabilities/86895(secalert@redhat.com)
https://www.mediawiki.org/wiki/Release_notes/1.19(secalert@redhat.com)
https://www.mediawiki.org/wiki/Release_notes/1.20(secalert@redhat.com)
https://www.mediawiki.org/wiki/Release_notes/1.21(secalert@redhat.com)
http://lists.wikimedia.org/pipermail/mediawiki-announce/2013-September/000133.html(af854a3a-2127-422b-91ae-364da2661108)
http://osvdb.org/96913(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/oss-sec/2013/q3/553(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/54715(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.wikimedia.org/show_bug.cgi?id=46332(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/86895(af854a3a-2127-422b-91ae-364da2661108)
https://www.mediawiki.org/wiki/Release_notes/1.19(af854a3a-2127-422b-91ae-364da2661108)
https://www.mediawiki.org/wiki/Release_notes/1.20(af854a3a-2127-422b-91ae-364da2661108)
https://www.mediawiki.org/wiki/Release_notes/1.21(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.