Lucene search

K
gentooGentoo FoundationGLSA-200710-21
HistoryOct 20, 2007 - 12:00 a.m.

TikiWiki: Arbitrary command execution

2007-10-2000:00:00
Gentoo Foundation
security.gentoo.org
35

0.962 High

EPSS

Percentile

99.5%

Background

TikiWiki is an open source content management system written in PHP.

Description

ShAnKaR reported that input passed to the โ€œfโ€ array parameter in tiki-graph_formula.php is not properly verified before being used to execute PHP functions.

Impact

An attacker could execute arbitrary code with the rights of the user running the web server by passing a specially crafted parameter string to the tiki-graph_formula.php file.

Workaround

There is no known workaround at this time.

Resolution

All TikiWiki users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=www-apps/tikiwiki-1.9.8.1"
OSVersionArchitecturePackageVersionFilename
Gentooanyallwww-apps/tikiwiki<ย 1.9.8.1UNKNOWN