Package: dokuwiki
Severity: critical

I just got this notice via freshmeat. Arbitrary code execution,
remotely exploitable. No assigned CVE number, yet.

Cheers,
-Hilko

-------------------- Start of forwarded message --------------------
From: <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Subject: [fmII] Serious security flaw in DokuWiki
Message-Id: <[EMAIL PROTECTED]>
Date: Sun,  4 Jun 2006 11:35:38 -0700 (PDT)

This is an email sent to you by the owners of the freshmeat.net project
record for DokuWiki. All URLs and other useful information can be found
at

    http://freshmeat.net/projects/dokuwiki/

________________________| Subscriber message |_________________________

Sent by: Andreas Gohr 
         http://freshmeat.net/~agohr/

Hello everybody!

Bad news: Stefan Esser from the Hardened-PHP project found a security
problem in DokuWiki's spellchecking backend which allows insertion of
arbitrary PHP code. This is a serious flaw and you should fix this
immediatly.

Users who don't use the spellchecking feature can fix the bug by simply
deleting the lib/exe/spellcheck.php file.

Detailed infos on how to fix the problem properly are available at
http://bugs.splitbrain.org/?do=details&id=823

The package available for download at
http://www.splitbrain.org/go/dokuwiki was fixed for this bug and another
minor XSS bug described at http://bugs.splitbrain.org/?do=details&id=820

Regards,
Andi 
__________________________| End of message |___________________________

[...]

-------------------- End of forwarded message --------------------


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to