CVE-2014-9253
Published: 17 December 2014
The default file type whitelist configuration in conf/mime.conf in the Media Manager in DokuWiki before 2014-09-29b allows remote attackers to execute arbitrary web script or HTML by uploading an SWF file, then accessing it via the media parameter to lib/exe/fetch.php.
Notes
Author | Note |
---|---|
seth-arnold | update from upstream just disables uploads for swf files |
Priority
Status
Package | Release | Status |
---|---|---|
dokuwiki Launchpad, Ubuntu, Debian |
artful |
Not vulnerable
|
bionic |
Not vulnerable
|
|
cosmic |
Not vulnerable
|
|
disco |
Not vulnerable
|
|
lucid |
Ignored
(end of life)
|
|
precise |
Ignored
(end of life)
|
|
trusty |
Does not exist
(trusty was needed)
|
|
upstream |
Released
(0.0.20140929.d-1)
|
|
utopic |
Ignored
(end of life)
|
|
vivid |
Ignored
(end of life)
|
|
wily |
Ignored
(end of life)
|
|
xenial |
Not vulnerable
(0.0.20140929.d-1ubuntu1)
|
|
yakkety |
Not vulnerable
(0.0.20160626.a-1)
|
|
zesty |
Not vulnerable
|
|
Patches: upstream: https://github.com/splitbrain/dokuwiki/commit/778ddf6f2cd9ed38b9db2d73e823b8c21243a960 |