Directory traversal vulnerability in tiki-listmovies.php in TikiWiki before 1.9.9 allows remote attackers to read arbitrary files via a .. (dot dot) and modified filename in the movie parameter.
Vector
NETWORK
Complexity
LOW
Authentication
NONE
Confidentiality
PARTIAL
Integrity
NONE
Availability
NONE
Tiki Tikiwiki CMS/Groupware 1.9.6
Tiki Tikiwiki CMS/Groupware 1.9.5
Tiki Tikiwiki CMS/Groupware 1.9.3
Tiki Tikiwiki CMS/Groupware 1.9.4
Tiki Tikiwiki CMS/Groupware 1.9.2
Tiki Tikiwiki CMS/Groupware 1.9.1
Tiki Tikiwiki CMS/Groupware 1.9.0 release candidate 3
Tiki Tikiwiki CMS/Groupware 1.9.0 release candidate 2
Tiki Tikiwiki CMS/Groupware 1.9.0 release candidate 1
Tiki Tikiwiki CMS/Groupware 1.9.0
Tiki Tikiwiki CMS/Groupware 1.6.1
Tiki Tikiwiki CMS/Groupware 1.9.7
Tiki Tikiwiki CMS/Groupware 1.9.8
Advisory | Patch | Confirmed | Link |
---|---|---|---|
4942 | |||
20071224 [ISecAuditors Security Advisories] Tikiwiki CMS... | |||
27008 | |||
3484 | |||
http://tikiwiki.org/ReleaseProcess199 | |||
GLSA-200801-10 |
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (ID 22)
Related CAPEC 7
Relative Path Traversal (CAPEC-ID 139)
Directory Traversal (CAPEC-ID 213)
File System Function Injection, Content Based (CAPEC-ID 23)
Using Slashes and URL Encoding Combined to Bypass Validation Logic (CAPEC-ID 64)
Manipulating Input to File System Calls (CAPEC-ID 76)
Using Escaped Slashes in Alternate Encoding (CAPEC-ID 78)
Using Slashes in Alternate Encoding (CAPEC-ID 79)