Eval injection vulnerability in MediaWiki 1.5.x before 1.5.3 allows remote attackers to execute arbitrary PHP code via the "user language option," which is used as part of a dynamic class name that is processed using the eval function.
| Software | From | Fixed in |
|---|---|---|
| mediawiki / mediawiki | 1.5.1 | 1.5.1.x |
| mediawiki / mediawiki | 1.5.2 | 1.5.2.x |
| mediawiki / mediawiki | 1.5_alpha2 | 1.5_alpha2.x |
| mediawiki / mediawiki | 1.5.0 | 1.5.0.x |
| mediawiki / mediawiki | 1.5_beta3 | 1.5_beta3.x |
| mediawiki / mediawiki | 1.5_beta1 | 1.5_beta1.x |
| mediawiki / mediawiki | 1.5_beta2 | 1.5_beta2.x |
| mediawiki / mediawiki | 1.5_alpha1 | 1.5_alpha1.x |