From a24567fbc43f221b14e805f9bc0b7c6d16911c46 Mon Sep 17 00:00:00 2001 From: Alex Legler Date: Sun, 8 Mar 2015 22:02:38 +0100 Subject: Import existing advisories --- glsa-200501-41.xml | 63 ++++++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 63 insertions(+) create mode 100644 glsa-200501-41.xml (limited to 'glsa-200501-41.xml') diff --git a/glsa-200501-41.xml b/glsa-200501-41.xml new file mode 100644 index 00000000..db34d4ed --- /dev/null +++ b/glsa-200501-41.xml @@ -0,0 +1,63 @@ + + + + + + + TikiWiki: Arbitrary command execution + + A bug in TikiWiki allows certain users to upload and execute malicious PHP + scripts. + + tikiwiki + January 30, 2005 + May 22, 2006: 02 + 78944 + remote + + + 1.8.5 + 1.8.5 + + + +

+ TikiWiki is a web-based groupware and content management system (CMS), + using PHP, ADOdb and Smarty. +

+
+ +

+ TikiWiki does not validate files uploaded to the "temp" directory. +

+
+ +

+ A malicious user could run arbitrary commands on the server by + uploading and calling a PHP script. +

+
+ +

+ There is no known workaround at this time. +

+
+ +

+ All TikiWiki users should upgrade to the latest version: +

+ + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-apps/tikiwiki-1.8.5" +
+ + TikiWiki Advisory + CVE-2005-0200 + + + DerCorny + + + vorlon078 + +
-- cgit v1.2.3-65-gdbad