Vulnerability Description
The call parameter of /lib/exe/ajax.php in DokuWiki through 2017-02-19e does not properly encode user input, which leads to a reflected file download vulnerability, and allows remote attackers to run arbitrary programs.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dokuwiki | Dokuwiki | <= 2017-02-19e |
| Debian | Debian Linux | 7.0 |
Related Weaknesses (CWE)
References
- https://github.com/splitbrain/dokuwiki/commit/238b8e878ad48f370903465192b57c2072Patch
- https://github.com/splitbrain/dokuwiki/issues/2029ExploitIssue TrackingThird Party Advisory
- https://github.com/splitbrain/dokuwiki/pull/2019Issue Tracking
- https://hackerone.com/reports/238316Permissions Required
- https://lists.debian.org/debian-lts-announce/2018/02/msg00004.htmlIssue TrackingMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2018/07/msg00004.html
- https://vulnhive.com/2018/000004ExploitIssue TrackingPatch
- https://github.com/splitbrain/dokuwiki/commit/238b8e878ad48f370903465192b57c2072Patch
- https://github.com/splitbrain/dokuwiki/issues/2029ExploitIssue TrackingThird Party Advisory
- https://github.com/splitbrain/dokuwiki/pull/2019Issue Tracking
- https://hackerone.com/reports/238316Permissions Required
- https://lists.debian.org/debian-lts-announce/2018/02/msg00004.htmlIssue TrackingMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2018/07/msg00004.html
- https://vulnhive.com/2018/000004ExploitIssue TrackingPatch
FAQ
What is CVE-2017-18123?
CVE-2017-18123 is a vulnerability with a CVSS score of 8.6 (HIGH). The call parameter of /lib/exe/ajax.php in DokuWiki through 2017-02-19e does not properly encode user input, which leads to a reflected file download vulnerability, and allows remote attackers to run ...
How severe is CVE-2017-18123?
CVE-2017-18123 has been rated HIGH with a CVSS base score of 8.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-18123?
Check the references section above for vendor advisories and patch information. Affected products include: Dokuwiki Dokuwiki, Debian Debian Linux.