First published: Wed Jun 07 2006(Updated: )
The spellchecker (spellcheck.php) in DokuWiki 2006/06/04 and earlier allows remote attackers to insert and execute arbitrary PHP code via "complex curly syntax" that is inserted into a regular expression that is processed by preg_replace with the /e (executable) modifier.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
DokuWiki | <=release_2006-06-04 | |
DokuWiki | =release_2004-07-04 | |
DokuWiki | =release_2004-07-07 | |
DokuWiki | =release_2004-07-12 | |
DokuWiki | =release_2004-07-21 | |
DokuWiki | =release_2004-07-25 | |
DokuWiki | =release_2004-08-08 | |
DokuWiki | =release_2004-08-15a | |
DokuWiki | =release_2004-08-22 | |
DokuWiki | =release_2004-09-12 | |
DokuWiki | =release_2004-09-25 | |
DokuWiki | =release_2004-09-30 | |
DokuWiki | =release_2004-10-19 | |
DokuWiki | =release_2004-11-01 | |
DokuWiki | =release_2004-11-02 | |
DokuWiki | =release_2004-11-10 | |
DokuWiki | =release_2005-01-14 | |
DokuWiki | =release_2005-01-15 | |
DokuWiki | =release_2005-01-16a | |
DokuWiki | =release_2005-02-06 | |
DokuWiki | =release_2005-02-18 | |
DokuWiki | =release_2005-05-07 | |
DokuWiki | =release_2005-07-01 | |
DokuWiki | =release_2005-07-13 | |
DokuWiki | =release_2005-09-19 | |
DokuWiki | =release_2005-09-22 | |
DokuWiki | =release_2006-03-05 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-2878 is considered a critical vulnerability as it allows remote attackers to execute arbitrary PHP code.
To fix CVE-2006-2878, upgrade DokuWiki to a version released after 2006-06-04, or patch the spellcheck.php file to remove the vulnerable regex handling.
CVE-2006-2878 affects DokuWiki versions up to and including 2006-06-04 and several earlier versions.
Exploitation of CVE-2006-2878 could lead to unauthorized access and control over the server running DokuWiki.
You can identify if your system is vulnerable to CVE-2006-2878 by checking the DokuWiki version and examining the spellcheck.php code for the presence of the /e modifier in regex functions.