A vulnerability in Tiki Wiki CMS 15.2 could allow a remote attacker to read arbitrary files on a targeted system via a crafted pathname in a banner URL field.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/96787 | vdb entry |
https://dev.tiki.org/item6174 | permissions required |
https://sourceforge.net/p/tikiwiki/code/60308/ | issue tracking third party advisory patch |