Directory traversal vulnerability in the ACL Manager plugin (plugins/acl/ajax.php) in DokuWiki before 2009-12-25b allows remote attackers to list the contents of arbitrary directories via a .. (dot dot) in the ns parameter.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/034729.html | vendor advisory |
http://secunia.com/advisories/38183 | third party advisory vendor advisory |
http://security.gentoo.org/glsa/glsa-201301-07.xml | vendor advisory |
http://www.vupen.com/english/advisories/2010/0150 | vdb entry |
http://www.splitbrain.org/blog/2010-01/17-dokuwiki-security | |
http://www.debian.org/security/2010/dsa-1976 | vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/55660 | vdb entry |
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/034831.html | vendor advisory |
http://www.securityfocus.com/bid/37821 | vdb entry |
http://bugs.splitbrain.org/index.php?do=details&task_id=1847 | |
http://www.exploit-db.com/exploits/11141 | exploit |