vendor:
ErfurtWiki
by:
unohope
7.5
CVSS
HIGH
Local File Inclusion
94
CWE
Product Name: ErfurtWiki
Affected Version From: R1.02b
Affected Version To: R1.02b
Patch Exists: Yes
Related CWE: N/A
CPE: a:erfurtwiki:erfurtwiki:1.02b
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008
ErfurtWiki <= R1.02b (css) Local File Inclusion Vulnerability
ErfurtWiki is vulnerable to local file inclusion. An attacker can exploit this vulnerability to include local files on the web server. This can be exploited to view sensitive files on the web server, such as the /etc/passwd file. The vulnerability is due to the 'ewiki_id' parameter in the 'css.php' script not properly sanitizing user-supplied input. An attacker can exploit this vulnerability by supplying a malicious 'ewiki_id' parameter value in a GET request to the 'css.php' script. This can be exploited to include local files on the web server, such as the '/etc/passwd' file.
Mitigation:
The vendor has released a patch to address this vulnerability. Users are advised to upgrade to the latest version of ErfurtWiki.