blob: 4a3d53672fdfea967b02cd98a3d905a086fe2ea0 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200507-06">
<title>TikiWiki: Arbitrary command execution through XML-RPC</title>
TikiWiki includes PHP XML-RPC code, making it vulnerable to arbitrary
command execution.
<product type="ebuild">Tikiwiki</product>
<announced>July 06, 2005</announced>
<revised>July 06, 2005: 01</revised>
<package name="www-apps/tikiwiki" auto="yes" arch="*">
<unaffected range="ge">1.8.5-r1</unaffected>
<vulnerable range="lt">1.8.5-r1</vulnerable>
TikiWiki is a web-based groupware and content management system
(CMS), using PHP, ADOdb and Smarty. TikiWiki includes vulnerable PHP
XML-RPC code.
TikiWiki is vulnerable to arbitrary command execution as described
in GLSA 200507-01.
<impact type="high">
A remote attacker could exploit this vulnerability to execute
arbitrary PHP code by sending specially crafted XML data.
There is no known workaround at this time.
All TikiWiki users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=www-apps/tikiwiki-1.8.5-r1&quot;</code>
<uri link="">GLSA 200507-01</uri>
<uri link="">CAN-2005-1921</uri>
<metadata tag="requester" timestamp="Wed, 06 Jul 2005 08:27:19 +0000">
<metadata tag="bugReady" timestamp="Wed, 06 Jul 2005 08:27:44 +0000">
<metadata tag="submitter" timestamp="Wed, 06 Jul 2005 11:56:52 +0000">