Vulnerability CVE-2017-18123


Published: 2018-02-03   Modified: 2018-02-05

Description:
The call parameter of /lib/exe/ajax.php in DokuWiki through 2017-02-19e does not properly encode user input, which leads to a reflected file download vulnerability, and allows remote attackers to run arbitrary programs.

Type:

CWE-20

(Improper Input Validation)

CVSS2 => (AV:N/AC:M/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
9.3/10
10/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Dokuwiki -> Dokuwiki 
Debian -> Debian linux 

 References:
https://github.com/splitbrain/dokuwiki/commit/238b8e878ad48f370903465192b57c2072f65d86
https://github.com/splitbrain/dokuwiki/issues/2029
https://github.com/splitbrain/dokuwiki/pull/2019
https://hackerone.com/reports/238316
https://lists.debian.org/debian-lts-announce/2018/02/msg00004.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00004.html
https://vulnhive.com/2018/000004

Copyright 2024, cxsecurity.com

 

Back to Top