Joined: 12 May 2004
|Posted: Sat Oct 20, 2007 9:26 pm Post subject: [ GLSA 200710-21 ] TikiWiki: Arbitrary command execution
|Gentoo Linux Security Advisory
Title: TikiWiki: Arbitrary command execution (GLSA 200710-21)
Date: October 20, 2007
Tikiwiki contains a command injection vulnerability which may allow remote execution of arbitrary code.
TikiWiki is an open source content management system written in PHP.
Vulnerable: < 126.96.36.199
Unaffected: >= 188.8.131.52
Architectures: All supported architectures
ShAnKaR reported that input passed to the "f" array parameter in tiki-graph_formula.php is not properly verified before being used to execute PHP functions.
An attacker could execute arbitrary code with the rights of the user running the web server by passing a specially crafted parameter string to the tiki-graph_formula.php file.
There is no known workaround at this time.
All TikiWiki users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=www-apps/tikiwiki-184.108.40.206"