The call parameter of /lib/exe/ajax.php in DokuWiki through 2017-02-19e does not properly encode user input, which leads to a reflected file download vulnerability, and allows remote attackers to run arbitrary programs.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://github.com/splitbrain/dokuwiki/pull/2019 | issue tracking |
https://vulnhive.com/2018/000004 | patch exploit third party advisory issue tracking |
https://lists.debian.org/debian-lts-announce/2018/02/msg00004.html | mailing list third party advisory issue tracking |
https://lists.debian.org/debian-lts-announce/2018/07/msg00004.html | mailing list |
https://github.com/splitbrain/dokuwiki/commit/238b8e878ad48f370903465192b57c2072f65d86 | patch |
https://hackerone.com/reports/238316 | permissions required |
https://github.com/splitbrain/dokuwiki/issues/2029 | third party advisory issue tracking exploit |