First published: Sat Nov 04 2006(Updated: )
Tikiwiki 1.9.5 allows remote attackers to obtain sensitive information (MySQL username and password) via an empty sort_mode parameter in (1) tiki-listpages.php, (2) tiki-lastchanges.php, (3) messu-archive.php, (4) messu-mailbox.php, (5) messu-sent.php, (6) tiki-directory_add_site.php, (7) tiki-directory_ranking.php, (8) tiki-directory_search.php, (9) tiki-forums.php, (10) tiki-view_forum.php, (11) tiki-friends.php, (12) tiki-list_blogs.php, (13) tiki-list_faqs.php, (14) tiki-list_trackers.php, (15) tiki-list_users.php, (16) tiki-my_tiki.php, (17) tiki-notepad_list.php, (18) tiki-orphan_pages.php, (19) tiki-shoutbox.php, (20) tiki-usermenu.php, and (21) tiki-webmail_contacts.php, which reveal the information in certain database error messages.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tiki Wiki CMS Groupware | =1.9.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-5702 is considered a medium severity vulnerability due to the potential exposure of sensitive information.
To fix CVE-2006-5702, upgrade Tikiwiki to version 1.9.6 or later, where this vulnerability has been addressed.
CVE-2006-5702 can expose sensitive information such as MySQL usernames and passwords.
CVE-2006-5702 specifically affects Tikiwiki version 1.9.5.
CVE-2006-5702 is exploited through the empty sort_mode parameter in various Tikiwiki PHP scripts.