发布时间 :2004-12-31 00:00:00
修订时间 :2012-10-24 00:00:00

[原文]TikiWiki before does not properly verify uploaded images, which could allow remote attackers to upload and execute arbitrary PHP scripts, a different vulnerability than CVE-2005-0200.



- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-20 [输入验证不恰当]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(PATCH)  BID  12110
(PATCH)  GENTOO  GLSA-200501-12
(UNKNOWN)  XF  tikiwiki-image-command-execution(18691)

- 漏洞信息

高危 输入验证
2004-12-31 00:00:00 2005-10-28 00:00:00

- 公告与补丁

        Gentoo has released an advisory to provide updates for this issue. Updates may be applied by running the following commands as the superuser:
        emerge --sync
        emerge --ask --oneshot --verbose ">=www-apps/tikiwiki-"
        This issue has been addressed in releases 1.7.9, 1.8.5, and 1.9-rc3.1.
        TikiWiki Project TikiWiki 1.7.1 .1
        TikiWiki Project TikiWiki 1.7.2
        TikiWiki Project TikiWiki 1.7.3
        TikiWiki Project TikiWiki 1.7.4
        TikiWiki Project TikiWiki 1.7.5
        TikiWiki Project TikiWiki 1.7.6
        TikiWiki Project TikiWiki 1.7.7
        TikiWiki Project TikiWiki 1.7.8
        TikiWiki Project TikiWiki 1.8
        TikiWiki Project TikiWiki 1.8.1
        TikiWiki Project TikiWiki 1.8.2
        TikiWiki Project TikiWiki 1.8.3
        TikiWiki Project TikiWiki 1.8.4
        TikiWiki Project TikiWiki 1.9 -rc3
        TikiWiki Project TikiWiki 1.9 -rc2
        TikiWiki Project TikiWiki 1.9 -rc1

- 漏洞信息

TikiWiki Image Upload File Type Verification Failure Arbitrary Code Execution
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Public Vendor Verified

- 漏洞描述

Tikiwiki contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to tiki-editpage.php not properly sanitizing or restricting what types of files are uploaded to the img/wiki_up/ directory. This may allow a remote, authenticated attacker to upload a malicious script and cause it to be executed on the server, leading to a loss of integrity.

- 时间线

2004-12-29 Unknow
2004-12-29 Unknow

- 解决方案

Upgrade to versions 1.7.9,, or 1.9rc3.1, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者