Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-9253

Опубликовано: 17 дек. 2014
Источник: ubuntu
Приоритет: medium
CVSS2: 4.3

Описание

The default file type whitelist configuration in conf/mime.conf in the Media Manager in DokuWiki before 2014-09-29b allows remote attackers to execute arbitrary web script or HTML by uploading an SWF file, then accessing it via the media parameter to lib/exe/fetch.php.

РелизСтатусПримечание
artful

not-affected

bionic

not-affected

cosmic

not-affected

devel

not-affected

disco

not-affected

esm-apps/bionic

not-affected

esm-apps/xenial

not-affected

0.0.20140929.d-1ubuntu1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was needed]
lucid

ignored

end of life
precise

ignored

end of life

Показывать по

4.3 Medium

CVSS2

Связанные уязвимости

nvd
около 11 лет назад

The default file type whitelist configuration in conf/mime.conf in the Media Manager in DokuWiki before 2014-09-29b allows remote attackers to execute arbitrary web script or HTML by uploading an SWF file, then accessing it via the media parameter to lib/exe/fetch.php.

debian
около 11 лет назад

The default file type whitelist configuration in conf/mime.conf in the ...

github
больше 3 лет назад

The default file type whitelist configuration in conf/mime.conf in the Media Manager in DokuWiki before 2014-09-29b allows remote attackers to execute arbitrary web script or HTML by uploading an SWF file, then accessing it via the media parameter to lib/exe/fetch.php.

4.3 Medium

CVSS2