![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.800582 |
Categoría: | Web application abuses |
Título: | DokuWiki 'doku.php' Local File Inclusion Vulnerability |
Resumen: | DokuWiki is prone to Local File Inclusion vulnerability. |
Descripción: | Summary: DokuWiki is prone to Local File Inclusion vulnerability. Vulnerability Insight: The flaw is due to error in 'config_cascade[main][default][]' parameter in 'inc/init.php' is not properly verified before being used to include files to 'doku.php'. Vulnerability Impact: Successful exploitation will allow attacker to include and execute arbitrary files from local and external resources, and can gain sensitive information about remote system directories when register_globals is enabled. Affected Software/OS: DoKuWiki version prior to 2009-02-14b on Linux. Solution: Upgrade to version 2009-02-14b or later. CVSS Score: 9.3 CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2009-1960 BugTraq ID: 35095 http://www.securityfocus.com/bid/35095 https://www.exploit-db.com/exploits/8781 https://www.exploit-db.com/exploits/8812 http://secunia.com/advisories/35218 |
Copyright | Copyright (C) 2009 Greenbone AG |
Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |