Multiple directory traversal vulnerabilities in Tikiwiki before 1.9.1 allow remote attackers to read arbitrary files and execute commands via (1) the suck_url parameter to tiki-editpage.php or (2) language parameter to tiki-user_preferences.php.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://www.idefense.com/application/poi/display?id=335&type=vulnerabilities | third party advisory patch vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/23099 | vdb entry |
http://www.securityfocus.com/bid/15390 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/23095 | vdb entry |
http://www.securityfocus.com/bid/15392 | vdb entry |
http://securitytracker.com/id?1015190 | vdb entry |
http://www.idefense.com/application/poi/display?id=337&type=vulnerabilities | third party advisory patch vendor advisory |