Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5rj4-cvcv-vxcw

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

lib/exec/fetch.php in DokuWiki before 2006-03-09e, when conf[imconvert] is configured to use ImageMagick, allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) w and (2) h parameters, which are not filtered when invoking convert.

lib/exec/fetch.php in DokuWiki before 2006-03-09e, when conf[imconvert] is configured to use ImageMagick, allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) w and (2) h parameters, which are not filtered when invoking convert.

EPSS

Процентиль: 84%
0.02648
Низкий

Связанные уязвимости

ubuntu
около 19 лет назад

lib/exec/fetch.php in DokuWiki before 2006-03-09e, when conf[imconvert] is configured to use ImageMagick, allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) w and (2) h parameters, which are not filtered when invoking convert.

nvd
около 19 лет назад

lib/exec/fetch.php in DokuWiki before 2006-03-09e, when conf[imconvert] is configured to use ImageMagick, allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) w and (2) h parameters, which are not filtered when invoking convert.

debian
около 19 лет назад

lib/exec/fetch.php in DokuWiki before 2006-03-09e, when conf[imconvert ...

EPSS

Процентиль: 84%
0.02648
Низкий