Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-18123

Опубликовано: 03 фев. 2018
Источник: debian

Описание

The call parameter of /lib/exe/ajax.php in DokuWiki through 2017-02-19e does not properly encode user input, which leads to a reflected file download vulnerability, and allows remote attackers to run arbitrary programs.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
dokuwikifixed0.0.20160626.a-2.1package

Примечания

  • https://github.com/splitbrain/dokuwiki/issues/2029

  • https://github.com/splitbrain/dokuwiki/commit/238b8e878ad48f370903465192b57c2072f65d86

Связанные уязвимости

CVSS3: 8.6
ubuntu
около 8 лет назад

The call parameter of /lib/exe/ajax.php in DokuWiki through 2017-02-19e does not properly encode user input, which leads to a reflected file download vulnerability, and allows remote attackers to run arbitrary programs.

CVSS3: 8.6
nvd
около 8 лет назад

The call parameter of /lib/exe/ajax.php in DokuWiki through 2017-02-19e does not properly encode user input, which leads to a reflected file download vulnerability, and allows remote attackers to run arbitrary programs.

CVSS3: 8.6
github
больше 3 лет назад

The call parameter of /lib/exe/ajax.php in DokuWiki through 2017-02-19e does not properly encode user input, which leads to a reflected file download vulnerability, and allows remote attackers to run arbitrary programs.