vendor:
Dokuwiki
by:
girex
7,5
CVSS
HIGH
Remote/Temporary File Inclusion
98
CWE
Product Name: Dokuwiki
Affected Version From: 2009-02-14
Affected Version To: 2009-02-14
Patch Exists: YES
Related CWE: N/A
CPE: a:dokuwiki:dokuwiki
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: None
2009
Dokuwiki 2009-02-14 Remote/Temporary File Inclusion exploit
Dokuwiki 2009-02-14 is vulnerable to Remote/Temporary File Inclusion. This exploit requires register_globals to be set to 'on' and allow_url_fopen to be set to 'On' (default) and allow_url_include to be set to 'On' (not default). The exploit can also be used with file_uploads set to 'On' (default) and a temporary file passed by the $_FILES[] array. The payload should be a shell script with the command passthru($_GET[cmd]); die();.
Mitigation:
Disable register_globals, allow_url_fopen, and allow_url_include. Ensure that file_uploads is disabled.