TikiWiki CMS/Groupware before 6.7 LTS and before 8.4 allows remote attackers to execute arbitrary PHP code via a crafted serialized object
Reporter | Title | Published | Views | Family All 18 |
---|---|---|---|---|
![]() | Tiki Wiki CMS Groupware <= 8.3 "unserialize()" PHP Code Execution | 4 Jul 201200:00 | โ | zdt |
![]() | Tiki Wiki <= 8.3 unserialize() PHP Code Execution | 9 Jul 201200:00 | โ | zdt |
![]() | Tiki Wiki unserialize() PHP Code Execution | 5 Jul 201218:58 | โ | metasploit |
![]() | CVE-2012-0911 | 12 Jul 201219:55 | โ | nvd |
![]() | Tiki Wiki <= 8.3 unserialize() PHP Code Execution | 6 Jul 201200:00 | โ | packetstorm |
![]() | Tiki Wiki CMS Groupware 8.3 Code Execution | 4 Jul 201200:00 | โ | packetstorm |
![]() | Tiki Wiki CMS Groupware 'unserialize()' PHPไปฃ็ ๆง่กๆผๆด | 6 Jul 201200:00 | โ | seebug |
![]() | Tiki Wiki CMS Groupware <= 8.3 "unserialize()" PHP Code Execution | 1 Jul 201400:00 | โ | seebug |
![]() | Tiki Wiki CMS Groupware 8.3 - 'Unserialize()' PHP Code Execution | 4 Jul 201200:00 | โ | exploitdb |
![]() | Tiki Wiki CMS Groupware 8.3 - 'Unserialize()' PHP Code Execution (Metasploit) | 9 Jul 201200:00 | โ | exploitdb |
Parameter | Position | Path | Description | CWE |
---|---|---|---|---|
printpages | request body | tiki-print_multi_pages.php | This endpoint allows arbitrary PHP code execution via user-controlled input passed to unserialize function. | CWE-502 |
printpages | request body | tiki-print_pages.php | This endpoint allows arbitrary PHP code execution via user-controlled input passed to unserialize function. | CWE-502 |
printstructures | request body | tiki-print_pages.php | This endpoint allows arbitrary PHP code execution via user-controlled input passed to unserialize function. | CWE-502 |
sendpages | request body | tiki-send_objects.php | This endpoint allows arbitrary PHP code execution via user-controlled input passed to unserialize function. | CWE-502 |
sendstructures | request body | tiki-send_objects.php | This endpoint allows arbitrary PHP code execution via user-controlled input passed to unserialize function. | CWE-502 |
sendarticles | request body | tiki-send_objects.php | This endpoint allows arbitrary PHP code execution via user-controlled input passed to unserialize function. | CWE-502 |
cookieName | request body | lib/banners/bannerlib.php | This endpoint allows arbitrary PHP code execution via user-controlled input passed to unserialize function. | CWE-502 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contactย us for a demo andย discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo