VID |
21771 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The TikiWiki software is vulnerable to multiple directory traversal vulnerabilities. Tiki CMS/Groupware (aka TikiWiki) is a freely available Content Management System (CMS) and Groupware written in PHP. TikiWiki versions prior to 1.8.6 and 1.9.1 are vulnerable to multiple directory traversal vulnerabilities, caused by improper validation of user-supplied input passed to the language parameter of the tiki-user_preferences.php script and the suck_url parameter of the tiki-editpage.php script. A remote attacker could exploit these vulnerabilities to retrieve arbitrary files and possibly execute arbitrary PHP script code on the vulnerable system in the security context of the Web server process.
* References: http://www.idefense.com/application/poi/display?id=335&type=vulnerabilities http://www.idefense.com/application/poi/display?id=337&type=vulnerabilities http://sourceforge.net/project/shownotes.php?release_id=350764 http://www.securitytracker.com/alerts/2005/Nov/1015190.html
* Platforms Affected: Open-Source, TikiWiki versions prior to 1.8.6 Open-Source, TikiWiki versions prior to 1.9.1 Any operating system Any version |
Recommendation |
Upgrade to the latest version of TikiWiki (1.8.6 or 1.9.1 or later), available from the TikiWiki Download Web site at http://tikiwiki.org/Download |
Related URL |
CVE-2005-1925 (CVE) |
Related URL |
15390,15392 (SecurityFocus) |
Related URL |
23095,23099 (ISS) |
|