| VID |
21509 |
| Severity |
40 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The TikiWiki, according to its version number, has an arbitrary PHP code execution vulnerability. Tiki CMS/Groupware (aka TikiWiki) is a freely available Content Management System (CMS) and Groupware written in PHP. TikiWiki versions prior to 1.8.5 and 1.9 DR4 could allow a remote attacker to write an arbitrary PHP script file into the TikiWiki temporary folder. A remote attacker could exploit this vulnerability to execute arbitrary PHP script code on the vulnerable system in the context of the hosting web server process.
* Note: This check solely relied on the version number of the TikiWiki installed on the remote Web server to assess this vulnerability, so this might be a false positive.
* References: http://tikiwiki.org/art102 http://secunia.com/advisories/13948/
* Platforms Affected: Open-Source, TikiWiki versions prior to 1.8.5 Open-Source, TikiWiki versions prior to 1.9 DR4 Open-Source, TikiWiki versions prior to 1.9 RC3.1 Any operating system Any version |
| Recommendation |
Upgrade to the latest version of TikiWiki (1.8.5 or 1.9 DR4 or later), available from the TikiWiki Download Web site at http://tikiwiki.org/Download |
| Related URL |
CVE-2005-0200 (CVE) |
| Related URL |
12328 (SecurityFocus) |
| Related URL |
19006 (ISS) |
|