vendor:
Dokuwiki
by:
girex
7,5
CVSS
HIGH
Local File Inclusion
94
CWE
Product Name: Dokuwiki
Affected Version From: 2009-02-14
Affected Version To: rc2009-01-30
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009
Local File Inclusion in Dokuwiki
Dokuwiki is vulnerable to Local File Inclusion due to the lack of proper sanitization of user-supplied input. The vulnerability exists in the ‘/inc/init.php’ file, which is responsible for loading the configuration files. The ‘$config_cascade’ array can be set via register_globals, allowing an attacker to include arbitrary files from the local system. An attacker can exploit this vulnerability by sending a specially crafted request to the vulnerable application. This can be used to read sensitive files from the server, or even execute arbitrary code if the attacker is able to upload a malicious file to the server.
Mitigation:
Disable register_globals in php.ini, and ensure that user-supplied input is properly sanitized.