GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Sat Oct 20, 2007 9:26 pm Post subject: [ GLSA 200710-21 ] TikiWiki: Arbitrary command execution |
|
|
Gentoo Linux Security Advisory
Title: TikiWiki: Arbitrary command execution (GLSA 200710-21)
Severity: high
Exploitable: remote
Date: October 20, 2007
Bug(s): #195503
ID: 200710-21
Synopsis
Tikiwiki contains a command injection vulnerability which may allow remote execution of arbitrary code.
Background
TikiWiki is an open source content management system written in PHP.
Affected Packages
Package: www-apps/tikiwiki
Vulnerable: < 1.9.8.1
Unaffected: >= 1.9.8.1
Architectures: All supported architectures
Description
ShAnKaR reported that input passed to the "f" array parameter in tiki-graph_formula.php is not properly verified before being used to execute PHP functions.
Impact
An attacker could execute arbitrary code with the rights of the user running the web server by passing a specially crafted parameter string to the tiki-graph_formula.php file.
Workaround
There is no known workaround at this time.
Resolution
All TikiWiki users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=www-apps/tikiwiki-1.9.8.1" |
References
CVE-2007-5423 |
|