Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-9253

Опубликовано: 17 дек. 2014
Источник: debian

Описание

The default file type whitelist configuration in conf/mime.conf in the Media Manager in DokuWiki before 2014-09-29b allows remote attackers to execute arbitrary web script or HTML by uploading an SWF file, then accessing it via the media parameter to lib/exe/fetch.php.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
dokuwikifixed0.0.20140929.d-1package
dokuwikino-dsajessiepackage
dokuwikino-dsawheezypackage
dokuwikino-dsasqueezepackage

Примечания

  • https://github.com/splitbrain/dokuwiki/commit/778ddf6f2cd9ed38b9db2d73e823b8c21243a960

  • Advisory: http://security.szurek.pl/dokuwiki-20140929a-xss.html

Связанные уязвимости

ubuntu
около 11 лет назад

The default file type whitelist configuration in conf/mime.conf in the Media Manager in DokuWiki before 2014-09-29b allows remote attackers to execute arbitrary web script or HTML by uploading an SWF file, then accessing it via the media parameter to lib/exe/fetch.php.

nvd
около 11 лет назад

The default file type whitelist configuration in conf/mime.conf in the Media Manager in DokuWiki before 2014-09-29b allows remote attackers to execute arbitrary web script or HTML by uploading an SWF file, then accessing it via the media parameter to lib/exe/fetch.php.

github
больше 3 лет назад

The default file type whitelist configuration in conf/mime.conf in the Media Manager in DokuWiki before 2014-09-29b allows remote attackers to execute arbitrary web script or HTML by uploading an SWF file, then accessing it via the media parameter to lib/exe/fetch.php.