| VID |
210088 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The TikiWiki software is vulnerable to a directory traversal vulnerability in the 'tiki-listmovies.php' script. Tiki CMS/Groupware (aka TikiWiki) is a freely available Content Management System (CMS) and Groupware written in PHP. TikiWiki versions prior to 1.9.9 could allow a remote attacker to traverse directories on the system, caused by improper validation of user-supplied input passed to the 'movie' parameter of the 'tiki-listmovies.php' script. By sending a specially-crafted URL request to the 'tiki-listmovies.php' containing "dot dot" sequences (/../) in the 'movie' parameter, regardless of PHP's 'magic_quotes_gpc' and 'register_globals' settings, a remote attacker could traverse directories and read arbitrary files on the affected system.
* References: http://tikiwiki.org/ReleaseProcess199 http://www.securityfocus.com/archive/1/485482/30/0/threaded http://securityreason.com/securityalert/3484 http://secunia.com/advisories/28225
* Platforms Affected: Open Source Technology Group, TikiWiki versions prior to 1.9.9 Any operating system Any version |
| Recommendation |
Upgrade to the latest version of TikiWiki (1.9.9 or later), available from the TikiWiki Download Web site at http://tikiwiki.org/Download |
| Related URL |
CVE-2007-6528 (CVE) |
| Related URL |
27008 (SecurityFocus) |
| Related URL |
(ISS) |
|