Lucene search

K
gentooGentoo FoundationGLSA-200710-21
HistoryOct 20, 2007 - 12:00 a.m.

TikiWiki: Arbitrary command execution

2007-10-2000:00:00
Gentoo Foundation
security.gentoo.org
37

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.963

Percentile

99.6%

Background

TikiWiki is an open source content management system written in PHP.

Description

ShAnKaR reported that input passed to the โ€œfโ€ array parameter in tiki-graph_formula.php is not properly verified before being used to execute PHP functions.

Impact

An attacker could execute arbitrary code with the rights of the user running the web server by passing a specially crafted parameter string to the tiki-graph_formula.php file.

Workaround

There is no known workaround at this time.

Resolution

All TikiWiki users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=www-apps/tikiwiki-1.9.8.1"
OSVersionArchitecturePackageVersionFilename
Gentooanyallwww-apps/tikiwiki<ย 1.9.8.1UNKNOWN

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.963

Percentile

99.6%