First published: Mon Apr 12 2004(Updated: )
Multiple SQL injection vulnerabilities in Tiki CMS/Groupware (TikiWiki) 1.8.1 and earlier allow remote attackers to execute arbitrary SQL commands via the sort_mode parameter in (1) tiki-usermenu.php, (2) tiki-list_file_gallery.php, (3) tiki-directory_ranking.php, (4) tiki-browse_categories.php, (5) tiki-index.php, (6) tiki-user_tasks.php, (7) tiki-directory_ranking.php, (8) tiki-directory_search.php, (9) tiki-file_galleries.php, (10) tiki-list_faqs.php, (11) tiki-list_trackers.php, (12) tiki-list_blogs.php, or via the offset parameter in (13) tiki-usermenu.php, (14) tiki-browse_categories.php, (15) tiki-index.php, (16) tiki-user_tasks.php, (17) tiki-list_faqs.php, (18) tiki-list_trackers.php, or (19) tiki-list_blogs.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tiki Wiki CMS Groupware | <=1.8.1 | |
Tiki Wiki CMS Groupware | =1.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1925 is considered a critical vulnerability due to its potential for remote SQL injection attacks.
To fix CVE-2004-1925, upgrade Tiki CMS/Groupware to version 1.8.2 or later which addresses these SQL injection vulnerabilities.
CVE-2004-1925 affects TikiWiki versions up to and including 1.8.1 and version 1.6.1 specifically.
Yes, CVE-2004-1925 can be exploited remotely by attackers using crafted URLs to execute arbitrary SQL commands.
The vulnerable components in CVE-2004-1925 include tiki-usermenu.php, tiki-list_file_gallery.php, tiki-directory_ranking.php, and tiki-browse_categories.php.