First published: Fri Nov 18 2005(Updated: )
Multiple directory traversal vulnerabilities in Tikiwiki before 1.9.1 allow remote attackers to read arbitrary files and execute commands via (1) the suck_url parameter to tiki-editpage.php or (2) language parameter to tiki-user_preferences.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tiki Wiki CMS Groupware | =1.9.0-rc2 | |
Tiki Wiki CMS Groupware | =1.6.1 | |
Tiki Wiki CMS Groupware | =1.9.0-rc1 | |
Tiki Wiki CMS Groupware | =1.9.0-rc3 | |
Tiki Wiki CMS Groupware | <=1.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-1925 is considered a high severity vulnerability due to its ability to allow remote attackers to access sensitive files and execute commands.
To fix CVE-2005-1925, upgrade Tikiwiki to version 1.9.1 or later, which addresses the directory traversal vulnerabilities.
CVE-2005-1925 affects multiple versions of Tikiwiki, including 1.6.1 and all 1.9.0 release candidates.
Yes, CVE-2005-1925 can be easily exploited by attackers with knowledge of the suck_url and language parameters in the affected scripts.
If updating is not possible, restrict access to the affected Tikiwiki scripts and monitor logs for suspicious activity until a patch can be applied.