The spellchecker (spellcheck.php) in DokuWiki 2006/06/04 and earlier allows remote attackers to insert and execute arbitrary PHP code via "complex curly syntax" that is inserted into a regular expression that is processed by preg_replace with the /e (executable) modifier.
References
Configurations
Configuration 1 (hide)
|
Information
Published : 2006-06-06 17:02
Updated : 2018-10-18 09:43
NVD link : CVE-2006-2878
Mitre link : CVE-2006-2878
JSON object : View
CWE
Products Affected
andreas_gohr
- dokuwiki