Source: dokuwiki
Version: 0.0.20160626.a-2
Severity: important
Tags: patch security upstream
Forwarded: https://github.com/splitbrain/dokuwiki/issues/2029
Control: found -1 0.0.20140505.a+dfsg-4 

Hi,

the following vulnerability was published for dokuwiki.

CVE-2017-18123[0]:
| The call parameter of /lib/exe/ajax.php in DokuWiki through 2017-02-19e
| does not properly encode user input, which leads to a reflected file
| download vulnerability, and allows remote attackers to run arbitrary
| programs.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-18123
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18123
[1] https://github.com/splitbrain/dokuwiki/issues/2029
[2] 
https://github.com/splitbrain/dokuwiki/commit/238b8e878ad48f370903465192b57c2072f65d86

Regards,
Salvatore

_______________________________________________
Secure-testing-team mailing list
Secure-testing-team@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-team

Reply via email to