|
Family: Gentoo Local Security Checks --> Category: infos
[GLSA-200501-41] TikiWiki: Arbitrary command execution Vulnerability Scan
Vulnerability Scan Summary TikiWiki: Arbitrary command execution
Detailed Explanation for this Vulnerability Test
The remote host is affected by the vulnerability described in GLSA-200501-41
(TikiWiki: Arbitrary command execution)
TikiWiki does not validate files uploaded to the "temp" directory.
Impact
A malicious user could run arbitrary commands on the server by
uploading and calling a PHP script.
Workaround
There is no known workaround at this time.
References:
http://tikiwiki.org/art102
Solution:
All TikiWiki users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-apps/tikiwiki-1.8.5"
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.
|