Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 78944

Summary: www-apps/tikiwiki: Arbitrary Script Execution Vulnerability
Product: Gentoo Security Reporter: Jean-François Brunette (RETIRED) <formula7>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: major CC: gentoo, web-apps
Priority: High    
Version: unspecified   
Hardware: All   
OS: All   
URL: http://tikiwiki.org/art102
Whiteboard: B1 [glsa] jaervosz
Package list:
Runtime testing required: ---

Description Jean-François Brunette (RETIRED) gentoo-dev 2005-01-21 06:02:13 UTC
similar to the previous one (http://tikiwiki.org/art97)


Description:
Some vulnerabilities have been reported in TikiWiki, which can be exploited by malicious people to compromise a vulnerable system.

The vulnerabilities are caused due to missing validation of files placed in the "temp" directory and can be exploited to execute arbitrary PHP scripts.


The vulnerabilities have been reported in versions prior to 1.8.5 and 1.9 DR4.

Solution:
Update to version 1.8.5.
http://sourceforge.net/project/showfiles.php?group_id=64258

Deny access to the "temp" directory.
Comment 1 Thierry Carrez (RETIRED) gentoo-dev 2005-01-21 06:32:22 UTC
Nasty, indeed.
web-apps, bumping is necessary.
Comment 2 Martin Holzer (RETIRED) gentoo-dev 2005-01-28 14:54:48 UTC
ebuild in cvs
Comment 3 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2005-01-28 22:50:54 UTC
Thx Martin.

ppc please test and mark stable.
Comment 4 Michael Hanselmann (hansmi) (RETIRED) gentoo-dev 2005-01-29 02:47:23 UTC
Stable on ppc.
Comment 5 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2005-01-30 00:42:48 UTC
GLSA 200501-41
Comment 6 Michael Davey 2005-04-03 06:19:46 UTC
*** Bug 79077 has been marked as a duplicate of this bug. ***