Korean
<< Back
VID 210079
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The TikiWiki software is vulnerable to a command execution vulnerability via the 'tiki-graph_formula.php' script. Tiki CMS/Groupware (aka TikiWiki) is a freely available Content Management System (CMS) and Groupware written in PHP. TikiWiki versions prior to 1.9.8.1 could allow a remote attacker to execute arbitrary commands, caused by improper validation of user-supplied input passed to the 'f[]' parameter of the 'tiki-graph_formula.php' script. Regardless of PHP's 'register_globals' setting, a remote attacker could exploit this vulnerability to inject and execute arbitrary commands with the privileges of the web server.

* References:
http://info.tikiwiki.org/tiki-read_article.php?articleId=14
http://www.securityfocus.com/archive/1/482006/30/0/threaded
http://www.frsirt.com/english/advisories/2007/3492
http://secunia.com/advisories/27190

* Platforms Affected:
Open Source Technology Group, TikiWiki versions prior to 1.9.8.1
Any operating system Any version
Recommendation Upgrade to the latest version of TikiWiki (1.9.8.1 or later), available from the TikiWiki Download Web site at http://tikiwiki.org/Download
Related URL CVE-2007-5423 (CVE)
Related URL 26006 (SecurityFocus)
Related URL 37076 (ISS)