Joined: 12 May 2004
|Posted: Wed Jul 06, 2005 8:51 pm Post subject: [ GLSA 200507-06 ] TikiWiki: Arbitrary command execution thr
|Gentoo Linux Security Advisory
Title: TikiWiki: Arbitrary command execution through XML-RPC (GLSA 200507-06)
Date: July 06, 2005
TikiWiki includes PHP XML-RPC code, making it vulnerable to arbitrary command execution.
TikiWiki is a web-based groupware and content management system (CMS), using PHP, ADOdb and Smarty. TikiWiki includes vulnerable PHP XML-RPC code.
Vulnerable: < 1.8.5-r1
Unaffected: >= 1.8.5-r1
Architectures: All supported architectures
TikiWiki is vulnerable to arbitrary command execution as described in GLSA 200507-01.
A remote attacker could exploit this vulnerability to execute arbitrary PHP code by sending specially crafted XML data.
There is no known workaround at this time.
All TikiWiki users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=www-apps/tikiwiki-1.8.5-r1"
Last edited by GLSA on Sun May 07, 2006 4:57 pm; edited 1 time in total