ID CVE-2006-4602
Summary Unrestricted file upload vulnerability in jhot.php in TikiWiki 1.9.4 Sirius and earlier allows remote attackers to execute arbitrary PHP code via a filepath parameter that contains a filename with a .php extension, which is uploaded to the img/wiki/ directory. Per: http://cwe.mitre.org/data/definitions/434.html 'CWE-434: Unrestricted Upload of File with Dangerous Type'
References
Vulnerable Configurations
  • cpe:2.3:a:tiki:tikiwiki_cms\/groupware:1.9.4:*:*:*:*:*:*:*
    cpe:2.3:a:tiki:tikiwiki_cms\/groupware:1.9.4:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 19-10-2017 - 01:29)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 19819
confirm http://tikiwiki.org/tiki-read_article.php?articleId=136
exploit-db 2288
gentoo GLSA-200609-16
misc http://isc.sans.org/diary.php?storyid=1672
osvdb 28456
secunia
  • 21733
  • 22100
vupen ADV-2006-3450
saint via4
bid 19819
description TikiWiki file upload vulnerability (jhot.php)
id web_prog_php_tikiwikiupload
osvdb 28456
title tikiwiki_jhot_upload
type remote
Last major update 19-10-2017 - 01:29
Published 07-09-2006 - 00:04
Last modified 19-10-2017 - 01:29
Back to Top