GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Wed Jul 06, 2005 8:51 pm Post subject: [ GLSA 200507-06 ] TikiWiki: Arbitrary command execution thr |
|
|
Gentoo Linux Security Advisory
Title: TikiWiki: Arbitrary command execution through XML-RPC (GLSA 200507-06)
Severity: high
Exploitable: remote
Date: July 06, 2005
Bug(s): #97648
ID: 200507-06
Synopsis
TikiWiki includes PHP XML-RPC code, making it vulnerable to arbitrary command execution.
Background
TikiWiki is a web-based groupware and content management system (CMS), using PHP, ADOdb and Smarty. TikiWiki includes vulnerable PHP XML-RPC code.
Affected Packages
Package: www-apps/tikiwiki
Vulnerable: < 1.8.5-r1
Unaffected: >= 1.8.5-r1
Architectures: All supported architectures
Description
TikiWiki is vulnerable to arbitrary command execution as described in GLSA 200507-01.
Impact
A remote attacker could exploit this vulnerability to execute arbitrary PHP code by sending specially crafted XML data.
Workaround
There is no known workaround at this time.
Resolution
All TikiWiki users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=www-apps/tikiwiki-1.8.5-r1" |
References
GLSA 200507-01
CAN-2005-1921
Last edited by GLSA on Sun May 07, 2006 4:57 pm; edited 1 time in total |
|