CVE-2017-18123
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
03/02/2018
Last modified:
07/07/2018
Description
The call parameter of /lib/exe/ajax.php in DokuWiki through 2017-02-19e does not properly encode user input, which leads to a reflected file download vulnerability, and allows remote attackers to run arbitrary programs.
Impact
Base Score 3.x
8.60
Severity 3.x
HIGH
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:dokuwiki:dokuwiki:*:*:*:*:*:*:*:* | 2017-02-19e (including) | |
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://github.com/splitbrain/dokuwiki/commit/238b8e878ad48f370903465192b57c2072f65d86
- https://github.com/splitbrain/dokuwiki/issues/2029
- https://github.com/splitbrain/dokuwiki/pull/2019
- https://hackerone.com/reports/238316
- https://lists.debian.org/debian-lts-announce/2018/02/msg00004.html
- https://lists.debian.org/debian-lts-announce/2018/07/msg00004.html
- https://vulnhive.com/2018/000004