9.3
CVSSv2

CVE-2009-1960

Published: 08/06/2009 Updated: 07/11/2023
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 940
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

inc/init.php in DokuWiki 2009-02-14, rc2009-02-06, and rc2009-01-30, when register_globals is enabled, allows remote malicious users to include and execute arbitrary local files via the config_cascade[main][default][] parameter to doku.php. NOTE: PHP remote file inclusion is also possible in PHP 5 using ftp:// URLs.

Vulnerable Product Search on Vulmon Subscribe to Product

dokuwiki dokuwiki rc2009-02-06

dokuwiki dokuwiki 2009-02-14

dokuwiki dokuwiki rc2009-01-30

Exploits

# Author_ girex # Homepage_ girexaltervistaorg # CMS_ Dokuwiki # Homepage_ dokuwikiorg # Affected versions_ 2009-02-14 rc2009-02-06 rc2009-01-30 # Bug_ Local file inclusion # Need_ register_globals = On # Vuln description_ # File: /inc/initphp // if available load a preload config file $preload = fullpath(dirname(__FILE ...
Dokuwiki 2009-02-14 Remote/Temporary File Inclusion exploit tested and working I was reading: wwwmilw0rmcom/exploits/8781 by girex [quote] It's not a RFI couse use of file_exists function [/quote] How wrong brother! trick 1 (ftp:// wrapper with php 5): needs register_globals = on allow_url_fopen = On (default) allow_url_include = On ( ...