CVE-2017-18123

NameCVE-2017-18123
DescriptionThe call parameter of /lib/exe/ajax.php in DokuWiki through 2017-02-19e does not properly encode user input, which leads to a reflected file download vulnerability, and allows remote attackers to run arbitrary programs.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-1269-1, DLA-1413-1
Debian Bugs889281

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
dokuwiki (PTS)buster0.0.20180422.a-2fixed
bullseye0.0.20180422.a-2.1fixed
sid, bookworm0.0.20220731.a-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
dokuwikisourcewheezy0.0.20120125b-2+deb7u2DLA-1269-1
dokuwikisourcejessie0.0.20140505.a+dfsg-4+deb8u1DLA-1413-1
dokuwikisource(unstable)0.0.20160626.a-2.1889281

Notes

https://github.com/splitbrain/dokuwiki/issues/2029
https://github.com/splitbrain/dokuwiki/commit/238b8e878ad48f370903465192b57c2072f65d86

Search for package or bug name: Reporting problems