Description
The call parameter of /lib/exe/ajax.php in DokuWiki through 2017-02-19e does not properly encode user input, which leads to a reflected file download vulnerability, and allows remote attackers to run arbitrary programs.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1269-1 | dokuwiki security update |
Debian DLA |
DLA-1413-1 | dokuwiki security update |
EUVD |
EUVD-2017-9258 | The call parameter of /lib/exe/ajax.php in DokuWiki through 2017-02-19e does not properly encode user input, which leads to a reflected file download vulnerability, and allows remote attackers to run arbitrary programs. |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T21:13:48.188Z
Reserved: 2018-02-02T00:00:00.000Z
Link: CVE-2017-18123
No data.
Status : Modified
Published: 2018-02-03T15:29:00.577
Modified: 2024-11-21T03:19:23.817
Link: CVE-2017-18123
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD