[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20050412205557.7f19dae5@xaero.tvpro.net>
Date: Tue, 12 Apr 2005 20:55:57 +0400
From: kreon <kre0n@...l.ru>
To: bugtraq@...urityfocus.com
Subject: DoKuWiki file-upload vulnerabilities
ADZ Security Team
===================
Info
Program: DoKuWiki
Version: 2005-02-18
Module: media.php
Bug type: File Upload bug
Vendor site: http://wiki.splitbrain.org/
Vendor Informed: Yes
===================
Bug Info
Remote user with file-upload privileges can upload anyone file with any
extention/content, like a <?php system($_GET['cmd']); ?> in php-script
If uploaded file cases allowed extention, like a cmd.gif.php, system
allows to upload it
I'd tested it on php-4.3.7.
===================
Contact
ADZ Security Team
URL: http://adz.void.ru/
IRC: #adz @ QuakeNet
MAIL: kre0n@...l.ru, adz.kreon@...il.com (for non-russian users)
Powered by blists - more mailing lists