FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

dokuwiki -- multiple vulnerabilities

Affected packages
dokuwiki < 20060309c
dokuwiki-devel < 20060909

Details

VuXML ID fcba5764-506a-11db-a5ae-00508d6a62df
Discovery 2006-09-08
Entry 2006-09-30
Modified 2006-10-02

Secunia reports:

rgod has discovered a vulnerability in DokuWiki, which can be exploited by malicious people to compromise a vulnerable system.

Input passed to the "TARGET_FN" parameter in bin/dwpage.php is not properly sanitised before being used to copy files. This can be exploited via directory traversal attacks in combination with DokuWiki's file upload feature to execute arbitrary PHP code.

CVE Mitre reports:

Direct static code injection vulnerability in doku.php in DokuWiki before 2006-03-09c allows remote attackers to execute arbitrary PHP code via the X-FORWARDED-FOR HTTP header, which is stored in config.php.

Unrestricted file upload vulnerability in lib/exe/media.php in DokuWiki before 2006-03-09c allows remote attackers to upload executable files into the data/media folder via unspecified vectors.

DokuWiki before 2006-03-09c enables the debug feature by default, which allows remote attackers to obtain sensitive information by calling doku.php with the X-DOKUWIKI-DO HTTP header set to "debug".

References

Bugtraq ID 19911
CVE Name CVE-2006-4674
CVE Name CVE-2006-4675
CVE Name CVE-2006-4679
URL http://bugs.splitbrain.org/index.php?do=details&id=906
URL http://secunia.com/advisories/21819/