Korean
<< Back
VID 210088
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The TikiWiki software is vulnerable to a directory traversal vulnerability in the 'tiki-listmovies.php' script. Tiki CMS/Groupware (aka TikiWiki) is a freely available Content Management System (CMS) and Groupware written in PHP. TikiWiki versions prior to 1.9.9 could allow a remote attacker to traverse directories on the system, caused by improper validation of user-supplied input passed to the 'movie' parameter of the 'tiki-listmovies.php' script. By sending a specially-crafted URL request to the 'tiki-listmovies.php' containing "dot dot" sequences (/../) in the 'movie' parameter, regardless of PHP's 'magic_quotes_gpc' and 'register_globals' settings, a remote attacker could traverse directories and read arbitrary files on the affected system.

* References:
http://tikiwiki.org/ReleaseProcess199
http://www.securityfocus.com/archive/1/485482/30/0/threaded
http://securityreason.com/securityalert/3484
http://secunia.com/advisories/28225

* Platforms Affected:
Open Source Technology Group, TikiWiki versions prior to 1.9.9
Any operating system Any version
Recommendation Upgrade to the latest version of TikiWiki (1.9.9 or later), available from the TikiWiki Download Web site at http://tikiwiki.org/Download
Related URL CVE-2007-6528 (CVE)
Related URL 27008 (SecurityFocus)
Related URL (ISS)