oss-sec mailing list archives
Re: CVE id request: dokuwiki
From: "Steven M. Christey" <coley () linus mitre org>
Date: Sat, 6 Jun 2009 13:48:13 -0400 (EDT)
====================================================== Name: CVE-2009-1960 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1960 Reference: MILW0RM:8781 Reference: URL:http://www.milw0rm.com/exploits/8781 Reference: MILW0RM:8812 Reference: URL:http://www.milw0rm.com/exploits/8812 Reference: CONFIRM:http://bugs.splitbrain.org/index.php?do=details&task_id=1700 Reference: SECUNIA:35218 Reference: URL:http://secunia.com/advisories/35218 inc/init.php in DokuWiki 2009-02-14, rc2009-02-06, and rc2009-01-30, when register_globals is enabled, allows remote attackers to include and execute arbitrary local files via the config_cascade[main][default][] parameter to doku.php. NOTE: PHP remote file inclusion is also possible in PHP 5 using ftp:// URLs.
Current thread:
- CVE id request: dokuwiki Nico Golde (Jun 04)
- Re: CVE id request: dokuwiki Steven M. Christey (Jun 06)