Tiki 8.2 and earlier allows remote administrators to execute arbitrary PHP code via crafted input to the regexres and regex parameters.
References
Link | Resource |
---|---|
https://packetstormsecurity.com/files/108111/Tiki-Wiki-CMS-Groupware-8.2-Code-Injection.html | Exploit Third Party Advisory VDB Entry |
Configurations
Information
Published : 2020-01-27 07:15
Updated : 2020-01-30 08:17
NVD link : CVE-2011-4558
Mitre link : CVE-2011-4558
JSON object : View
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
Products Affected
tiki
- tiki