The call parameter of /lib/exe/ajax.php in DokuWiki through 2017-02-19e does not properly encode user input, which leads to a reflected file download vulnerability, and allows remote attackers to run arbitrary programs.
2018-02-03T15:29:00.577
2024-11-21T03:19:23.817
Modified
CVSSv3.0: 8.6 (HIGH)
AV:N/AC:M/Au:N/C:C/I:C/A:C
8.6
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | dokuwiki | dokuwiki | ≤ 2017-02-19e | Yes |
Operating System | debian | debian_linux | 7.0 | Yes |