lib/exec/fetch.php in DokuWiki before 2006-03-09e, when conf[imconvert] is configured to use ImageMagick, allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) w and (2) h parameters, which are not filtered when invoking convert.
References
Link | Resource |
---|---|
http://bugs.splitbrain.org/?do=details&id=926 | Exploit |
http://security.gentoo.org/glsa/glsa-200609-20.xml | Patch |
http://secunia.com/advisories/22192 | Patch Vendor Advisory |
http://secunia.com/advisories/22199 | Patch Vendor Advisory |
http://www.vupen.com/english/advisories/2006/3851 |
Configurations
Configuration 1 (hide)
|
Information
Published : 2006-09-29 16:07
Updated : 2011-03-07 18:42
NVD link : CVE-2006-5099
Mitre link : CVE-2006-5099
JSON object : View
CWE
Products Affected
andreas_gohr
- dokuwiki