Korean
<< Back
VID 210081
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The TikiWiki software is vulnerable to multiple local file include vulnerabilities via the 'tiki-index.php' script. Tiki CMS/Groupware (aka TikiWiki) is a freely available Content Management System (CMS) and Groupware written in PHP. TikiWiki versions prior to 1.9.8.2 are vulnerable to a local file include vulnerability, caused by improper validation of user-supplied input passed to the 'error_handler_file' and/or 'local_php' parameters to the 'tiki-index.php' script. If the register_globals is enabled, an unauthenticated remote attacker could exploit this vulnerability to view arbitrary files or to execute arbitrary PHP code on the affected system. In addition, the component is also reportedly affected by multiple cross-site scripting vulnerabilities involving other parameters to the same script.

* References:
http://info.tikiwiki.org/tiki-read_article.php?articleId=15
http://www.securityfocus.com/archive/1/482801/30/0/threaded

* Platforms Affected:
Open Source Technology Group, TikiWiki versions prior to 1.9.8.2
Any operating system Any version
Recommendation Upgrade to the latest version of TikiWiki (1.9.8.2 or later), available from the TikiWiki Download Web site at http://tikiwiki.org/Download
Related URL CVE-2007-5683,CVE-2007-5684 (CVE)
Related URL 26211 (SecurityFocus)
Related URL 38110,38112,38116,38117 (ISS)