VID |
21976 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The TikiWiki software is vulnerable to an arbitrary file upload vulnerability via 'jhot.php' script. Tiki CMS/Groupware (aka TikiWiki) is a freely available Content Management System (CMS) and Groupware written in PHP. TikiWiki versions prior to 1.9.5 could allow a remote attacker to send a specially-crafted URL request to the jhot.php script using the file upload function to upload arbitrary files. If the 'file_uploads' is enabled, a remote attacker could exploit this vulnerability to upload arbitrary PHP files and execute arbitrary code on the affected system.
* References: http://tikiwiki.org/tiki-read_article.php?articleId=136 http://www.frsirt.com/english/advisories/2006/3450 http://www.milw0rm.com/exploits/2288 http://secunia.com/advisories/21733/
* Platforms Affected: Open-Source, TikiWiki versions prior to 1.9.5 Any operating system Any version |
Recommendation |
Upgrade to the latest version of TikiWiki (1.9.5 or later), available from the TikiWiki Download Web site at http://tikiwiki.org/Download |
Related URL |
CVE-2006-4602 (CVE) |
Related URL |
19819 (SecurityFocus) |
Related URL |
28746 (ISS) |
|