CVE-2017-18123

NameCVE-2017-18123
DescriptionThe call parameter of /lib/exe/ajax.php in DokuWiki through 2017-02-19e does not properly encode user input, which leads to a reflected file download vulnerability, and allows remote attackers to run arbitrary programs.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-1269-1
Debian Bugs889281

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
dokuwiki (PTS)wheezy0.0.20120125b-2+deb7u1vulnerable
wheezy (security)0.0.20120125b-2+deb7u2fixed
jessie0.0.20140505.a+dfsg-4vulnerable
buster, sid0.0.20160626.a-2vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
dokuwikisource(unstable)(unfixed)889281
dokuwikisourcewheezy0.0.20120125b-2+deb7u2DLA-1269-1

Notes

https://github.com/splitbrain/dokuwiki/issues/2029
https://github.com/splitbrain/dokuwiki/commit/238b8e878ad48f370903465192b57c2072f65d86

Search for package or bug name: Reporting problems