Korean
<< Back
VID 21984
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The PmWiki program is vulnerable to the global variables overwrite vulnerability via the 'pmwiki.php' script. PmWiki is a wiki-based system for collaborative creation and maintenance of websites. PmWiki versions prior to 2.1.21 could allow a remote attacker to execute arbitrary PHP codes, caused by improper filtering of user-supplied input passed to global variables in the pmwiki.php script. If the register_globals and file_uploads is enabled, a remote attacker could execute arbitrary PHP codes on the affected system with privileges of the Web server.

* References:
http://securitytracker.com/alerts/2006/Jun/1016306.html
http://www.milw0rm.com/exploits/2291
http://www.hardened-php.net/hphp/zend_hash_del_key_or_index_vulnerability.html
http://www.pmwiki.com/wiki/PmWiki/ReleaseNotes

* Platforms Affected:
PmWiki versions prior to 2.1.21
Any operating system Any version
Recommendation Upgrade to the latest version of PmWiki (2.1.21 or later), available from the PmWiki Download Web site at http://www.pmwiki.com/wiki/PmWiki/Download

As a workaround, disable PHP's 'register_globals' and 'file_uploads' settings.
Related URL CVE-2006-3017 (CVE)
Related URL 17843 (SecurityFocus)
Related URL 28779 (ISS)