Lucene search

K

Gentoo Security Advisory GLSA 200710-21 (tikiwiki)

๐Ÿ—“๏ธย 24 Sep 2008ย 00:00:00Reported byย Copyright (C) 2008 E-Soft Inc.Typeย 
openvas
ย openvas
๐Ÿ”—ย plugins.openvas.org๐Ÿ‘ย 15ย Views

Gentoo Security Advisory GLSA 200710-21 (tikiwiki) contains a command injection vulnerability allowing remote code execution

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Related
Refs
Code
ReporterTitlePublishedViews
Family
metasploit
TikiWiki tiki-graph_formula Remote PHP Code Execution
27 Jul 200914:05
โ€“metasploit
nessus
TikiWiki tiki-graph_formula.php f Parameter Arbitrary Command Execution
11 Oct 200700:00
โ€“nessus
nessus
GLSA-200710-21 : TikiWiki: Arbitrary command execution
25 Oct 200700:00
โ€“nessus
nessus
GLSA-200711-19 : TikiWiki: Multiple vulnerabilities
15 Nov 200700:00
โ€“nessus
exploitdb
TikiWiki tiki-graph_formula - PHP Remote Code Execution (Metasploit)
20 Sep 201000:00
โ€“exploitdb
canvas
Immunity Canvas: TIKIWIKI_EXEC
12 Oct 200723:17
โ€“canvas
prion
Design/Logic Flaw
12 Oct 200723:17
โ€“prion
prion
Design/Logic Flaw
26 Oct 200718:46
โ€“prion
ubuntucve
CVE-2007-5423
12 Oct 200700:00
โ€“ubuntucve
cve
CVE-2007-5423
12 Oct 200723:17
โ€“cve
Rows per page
# SPDX-FileCopyrightText: 2008 E-Soft Inc.
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.58700");
  script_version("2023-07-14T16:09:26+0000");
  script_tag(name:"last_modification", value:"2023-07-14 16:09:26 +0000 (Fri, 14 Jul 2023)");
  script_tag(name:"creation_date", value:"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)");
  script_cve_id("CVE-2007-5423");
  script_tag(name:"cvss_base", value:"7.5");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_name("Gentoo Security Advisory GLSA 200710-21 (tikiwiki)");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2008 E-Soft Inc.");
  script_family("Gentoo Local Security Checks");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("ssh/login/gentoo", "ssh/login/pkg");
  script_tag(name:"insight", value:"Tikiwiki contains a command injection vulnerability which may allow remote
execution of arbitrary code.");
  script_tag(name:"solution", value:"All TikiWiki users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose '>=www-apps/tikiwiki-1.9.8.1'");

  script_xref(name:"URL", value:"http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200710-21");
  script_xref(name:"URL", value:"http://bugs.gentoo.org/show_bug.cgi?id=195503");
  script_tag(name:"summary", value:"The remote host is missing updates announced in
advisory GLSA 200710-21.");
  script_tag(name:"qod_type", value:"package");
  script_tag(name:"solution_type", value:"VendorFix");

  exit(0);
}

include("pkg-lib-gentoo.inc");
include("revisions-lib.inc");

res = "";
report = "";
report = "";
if ((res = ispkgvuln(pkg:"www-apps/tikiwiki", unaffected: make_list("ge 1.9.8.1"), vulnerable: make_list("lt 1.9.8.1"))) != NULL) {
    report += res;
}

if (report != "") {
    security_message(data:report);
} else if (__pkg_match) {
    exit(99);
}

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contactย us for a demo andย discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
24 Sep 2008 00:00Current
6.7Medium risk
Vulners AI Score6.7
CVSS27.5
EPSS0.8887
15
.json
Report