Description** DISPUTED ** The set_language_path function in geshi.php in Generic Syntax Highlighter (GeSHi) before might allow remote attackers to conduct file inclusion attacks via crafted inputs that influence the default language path ($path variable). NOTE: this issue has been disputed by a vendor, stating that only a static value is used, so this is not a vulnerability in GeSHi. Separate CVE identifiers would be created for web applications that integrate GeSHi in a way that allows control of the default language path.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severityhigh
Debian Bugs504445, 504681, 504682

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
dokuwiki (PTS)bullseye, sid, buster0.0.20180422.a-2fixed
geshi (PTS)stretch1.0.8.11-2.1fixed
bullseye, sid, buster1.0.8.11-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs


its rather an application bug if the input to set_language_path is unfiltered user input
DokuWiki passes a static string to $path parameter
pgfouine too does not override default language files path

Search for package or bug name: Reporting problems