5
CVSSv2

CVE-2012-3996

Published: 12/07/2012 Updated: 24/10/2012
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 510
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

TikiWiki CMS/Groupware 8.3 and previous versions allows remote malicious users to obtain the installation path via a direct request to (1) admin/include_calendar.php, (2) tiki-rss_error.php, or (3) tiki-watershed_service.php.

Vulnerable Product Search on Vulmon Subscribe to Product

tiki tikiwiki cms\\/groupware 7.2

tiki tikiwiki cms\\/groupware 7.0

tiki tikiwiki cms\\/groupware 5.0

tiki tikiwiki cms\\/groupware 4.1

tiki tikiwiki cms\\/groupware 3.3

tiki tikiwiki cms\\/groupware 3.5

tiki tikiwiki cms\\/groupware 6.1

tiki tikiwiki cms\\/groupware 6.0

tiki tikiwiki cms\\/groupware 5.3

tiki tikiwiki cms\\/groupware 5.2

tiki tikiwiki cms\\/groupware 2.2

tiki tikiwiki cms\\/groupware

tiki tikiwiki cms\\/groupware 8.1

tiki tikiwiki cms\\/groupware 8.0

tiki tikiwiki cms\\/groupware 4.0

tiki tikiwiki cms\\/groupware 4

tiki tikiwiki cms\\/groupware 3.1

tiki tikiwiki cms\\/groupware 3.0

tiki tikiwiki cms\\/groupware 7.1

tiki tikiwiki cms\\/groupware 6.2

tiki tikiwiki cms\\/groupware 5.1

tiki tikiwiki cms\\/groupware 4.2

tiki tikiwiki cms\\/groupware 3.2

tiki tikiwiki cms\\/groupware 3.4

Exploits

<?php /* ----------------------------------------------------------------- Tiki Wiki CMS Groupware <= 83 "unserialize()" PHP Code Execution ----------------------------------------------------------------- author: Egidio Romano aka EgiX mail: n0b0d13s[at]gmail[dot]com software link: htt ...
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # web site for more information on licensing and terms of use # metasploitcom/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit ...