TikiWiki Multiple Vulnerabilities
There are several ways to discover the full physical path of the web directory on a server running TikiWiki. One way is by calling some files directly with a null or non-existent value as seen below. banner_click.php, categorize.php, tiki-admin_include_directory.php, tiki-directory_search.php. Some files specifically prevent this by checking to see if they are called directly. I am not sure why more of the TikiWiki files do not use the same preventive measure. Also, just about anywhere that there is potential for SQL tampering (read about that later) you can leave the value null, and generate an error that will disclose the full physical path of the web server. Below are a handful of examples, but surely it is not al of them. tiki-admin_include_directory.php, tiki-directory_search.php, tiki-editpage.php, tiki-index.php, tiki-listpages.php