Korean
<< Back
VID 21771
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The TikiWiki software is vulnerable to multiple directory traversal vulnerabilities. Tiki CMS/Groupware (aka TikiWiki) is a freely available Content Management System (CMS) and Groupware written in PHP. TikiWiki versions prior to 1.8.6 and 1.9.1 are vulnerable to multiple directory traversal vulnerabilities, caused by improper validation of user-supplied input passed to the language parameter of the tiki-user_preferences.php script and the suck_url parameter of the tiki-editpage.php script. A remote attacker could exploit these vulnerabilities to retrieve arbitrary files and possibly execute arbitrary PHP script code on the vulnerable system in the security context of the Web server process.

* References:
http://www.idefense.com/application/poi/display?id=335&type=vulnerabilities
http://www.idefense.com/application/poi/display?id=337&type=vulnerabilities
http://sourceforge.net/project/shownotes.php?release_id=350764
http://www.securitytracker.com/alerts/2005/Nov/1015190.html

* Platforms Affected:
Open-Source, TikiWiki versions prior to 1.8.6
Open-Source, TikiWiki versions prior to 1.9.1
Any operating system Any version
Recommendation Upgrade to the latest version of TikiWiki (1.8.6 or 1.9.1 or later), available from the TikiWiki Download Web site at http://tikiwiki.org/Download
Related URL CVE-2005-1925 (CVE)
Related URL 15390,15392 (SecurityFocus)
Related URL 23095,23099 (ISS)