发布时间 :2004-04-11 00:00:00
修订时间 :2017-07-10 21:31:28

[原文]Directory traversal vulnerability in the map feature (tiki-map.phtml) in Tiki CMS/Groupware (TikiWiki) 1.8.1 and earlier allows remote attackers to determine the existence of arbitrary files via .. (dot dot) sequences in the mapfile parameter.


        Tiki CMS/Groupware (TikiWiki) 1.8.1及其早期版本中的地图功能(tiki-map.phtml)存在目录遍历漏洞。远程攻击者可以通过mapfile参数中的..(点 点)序列确定任意文件的存在。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CWE (弱点类目)

CWE-22 [对路径名的限制不恰当(路径遍历)]

- CPE (受影响的平台与产品)

cpe:/a:tiki:tikiwiki_cms%2fgroupware:1.8.1Tiki Tikiwiki CMS/Groupware 1.8.1 (Polaris)
cpe:/a:tiki:tikiwiki_cms%2fgroupware:1.6.1Tiki Tikiwiki CMS/Groupware 1.6.1

- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BUGTRAQ  20040412 Multiple Vulnerabilities In Tiki CMS/Groupware [ TikiWiki ]
(UNKNOWN)  XF  tikiwiki-tikimap-file-disclosure(15848)

- 漏洞信息

中危 路径遍历
2004-04-11 00:00:00 2005-10-20 00:00:00
        Tiki CMS/Groupware (TikiWiki) 1.8.1及其早期版本中的地图功能(tiki-map.phtml)存在目录遍历漏洞。远程攻击者可以通过mapfile参数中的..(点 点)序列确定任意文件的存在。

- 公告与补丁

        The vendor has released TikiWiki 1.8.2 to address these issues:
        TikiWiki Project TikiWiki 1.8
        TikiWiki Project TikiWiki 1.8.1

- 漏洞信息 (23949)

TikiWiki Project 1.8 tiki-map.phtml Traversal Arbitrary File / Directory Enumeration (EDBID:23949)
php webapps
2004-04-12 Verified
0 JeiAr
N/A [点击下载]
Multiple vulnerabilities have been identified in various modules of the application. These vulnerabilities may allow a remote attacker to carry out various attacks such as path disclosure, cross-site scripting, HTML injection, SQL injection, directory traversal, and arbitrary file upload.


- 漏洞信息

TikiWiki tiki-map.phtml Traversal Arbitrary File / Directory Enumeration
Remote / Network Access Information Disclosure
Loss of Confidentiality
Exploit Public Vendor Verified

- 漏洞描述

TikiWiki contains a flaw that allows a remote attacker to verify the existance of files or directories outside of the web path. The issue is due to the "tiki-map.phtml" script not properly sanitizing user input, specifically traversal style attacks (../../) supplied via the "mapfile" variable.

- 时间线

2004-04-11 Unknow
2004-04-11 Unknow

- 解决方案

Upgrade to version 1.8.2 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者