vendor:
Tuleap
by:
xdrr
8,8
CVSS
HIGH
Command Injection
78
CWE
Product Name: Tuleap
Affected Version From: >= 8.3
Affected Version To: <= 9.6.99.86
Patch Exists: YES
Related CWE: CVE-2017-7981
CPE: a:tuleap:tuleap
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2017
Tuleap – Command Injection in Project Wiki
Authenticated users, including unprivileged users, with access to a project containing a wiki, can exploit this command injection (CI) vulnerability to gain remote unauthorised access to the server hosting the Tuleap web application. RCE is achieved by entering a SyntaxHighlighter plugin directive in a new wiki page on any wiki available in any project. The SyntaxHighligter plugin in vulnerable versions of PHPWiki passes the `syntax` argument to the `proc_open()` PHP builtin function which spawns a process in the operating system running the web application.
Mitigation:
Upgrade to the latest version of PHPWiki (1.5.5) which is no longer vulnerable to this issue.