vendor:
YesWiki
by:
HaHwul
7,5
CVSS
HIGH
Path Traversal
22
CWE
Product Name: YesWiki
Affected Version From: yeswiki 0.2
Affected Version To: yeswiki 0.2
Patch Exists: NO
Related CWE: none
CPE: a:yeswiki:yeswiki
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Debian [Wheezy], Ubuntu
2015
YESWIKI 0.2 – Path Traversal (template param)
YESWIKI 0.2 is vulnerable to Path Traversal. An attacker can exploit this vulnerability to read sensitive files from the server. This vulnerability exists due to insufficient sanitization of user-supplied input to the 'template' parameter in 'wakka.php' script. An attacker can send a specially crafted HTTP request to the vulnerable script and read sensitive files from the server.
Mitigation:
Input validation should be performed to ensure that user-supplied input is properly sanitized.