CVE-2017-18123

high

Description

The call parameter of /lib/exe/ajax.php in DokuWiki through 2017-02-19e does not properly encode user input, which leads to a reflected file download vulnerability, and allows remote attackers to run arbitrary programs.

References

https://lists.debian.org/debian-lts-announce/2018/07/msg00004.html

https://lists.debian.org/debian-lts-announce/2018/02/msg00004.html

https://hackerone.com/reports/238316

https://github.com/splitbrain/dokuwiki/pull/2019

https://github.com/splitbrain/dokuwiki/commit/238b8e878ad48f370903465192b57c2072f65d86

Details

Source: Mitre, NVD

Published: 2018-02-03

Updated: 2018-07-07

Risk Information

CVSS v2

Base Score: 9.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Severity: High

CVSS v3

Base Score: 8.6

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

Severity: High