CVE-2017-18123

NameCVE-2017-18123
DescriptionThe call parameter of /lib/exe/ajax.php in DokuWiki through 2017-02-19e does not properly encode user input, which leads to a reflected file download vulnerability, and allows remote attackers to run arbitrary programs.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-1269-1, DLA-1413-1
NVD severityhigh (attack range: remote)
Debian Bugs889281

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
dokuwiki (PTS)jessie0.0.20140505.a+dfsg-4vulnerable
jessie (security)0.0.20140505.a+dfsg-4+deb8u1fixed
buster0.0.20160626.a-2.1fixed
sid0.0.20180422.a-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
dokuwikisource(unstable)0.0.20160626.a-2.1high889281
dokuwikisourcejessie0.0.20140505.a+dfsg-4+deb8u1highDLA-1413-1
dokuwikisourcewheezy0.0.20120125b-2+deb7u2highDLA-1269-1

Notes

https://github.com/splitbrain/dokuwiki/issues/2029
https://github.com/splitbrain/dokuwiki/commit/238b8e878ad48f370903465192b57c2072f65d86

Search for package or bug name: Reporting problems