Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-g587-72hj-w684

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The default file type whitelist configuration in conf/mime.conf in the Media Manager in DokuWiki before 2014-09-29b allows remote attackers to execute arbitrary web script or HTML by uploading an SWF file, then accessing it via the media parameter to lib/exe/fetch.php.

The default file type whitelist configuration in conf/mime.conf in the Media Manager in DokuWiki before 2014-09-29b allows remote attackers to execute arbitrary web script or HTML by uploading an SWF file, then accessing it via the media parameter to lib/exe/fetch.php.

EPSS

Процентиль: 69%
0.00588
Низкий

Дефекты

CWE-79

Связанные уязвимости

ubuntu
около 11 лет назад

The default file type whitelist configuration in conf/mime.conf in the Media Manager in DokuWiki before 2014-09-29b allows remote attackers to execute arbitrary web script or HTML by uploading an SWF file, then accessing it via the media parameter to lib/exe/fetch.php.

nvd
около 11 лет назад

The default file type whitelist configuration in conf/mime.conf in the Media Manager in DokuWiki before 2014-09-29b allows remote attackers to execute arbitrary web script or HTML by uploading an SWF file, then accessing it via the media parameter to lib/exe/fetch.php.

debian
около 11 лет назад

The default file type whitelist configuration in conf/mime.conf in the ...

EPSS

Процентиль: 69%
0.00588
Низкий

Дефекты

CWE-79