Vulnerability Description
lib/exec/fetch.php in DokuWiki before 2006-03-09e, when conf[imconvert] is configured to use ImageMagick, allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) w and (2) h parameters, which are not filtered when invoking convert.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Andreas Gohr | Dokuwiki | release_2006-03-05 |
References
- http://bugs.splitbrain.org/?do=details&id=926Exploit
- http://secunia.com/advisories/22192PatchVendor Advisory
- http://secunia.com/advisories/22199PatchVendor Advisory
- http://security.gentoo.org/glsa/glsa-200609-20.xmlPatch
- http://www.vupen.com/english/advisories/2006/3851
- http://bugs.splitbrain.org/?do=details&id=926Exploit
- http://secunia.com/advisories/22192PatchVendor Advisory
- http://secunia.com/advisories/22199PatchVendor Advisory
- http://security.gentoo.org/glsa/glsa-200609-20.xmlPatch
- http://www.vupen.com/english/advisories/2006/3851
FAQ
What is CVE-2006-5099?
CVE-2006-5099 is a vulnerability with a CVSS score of 7.5 (HIGH). lib/exec/fetch.php in DokuWiki before 2006-03-09e, when conf[imconvert] is configured to use ImageMagick, allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) w an...
How severe is CVE-2006-5099?
CVE-2006-5099 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-5099?
Check the references section above for vendor advisories and patch information. Affected products include: Andreas Gohr Dokuwiki.