First published: Mon Jun 25 2012(Updated: )
A full path disclosure flaw was found in the way DokuWiki, a standards compliant, simple to use Wiki, performed sanitization of HTTP POST 'prefix' input value prior passing it to underlying PHP substr() routine, when the PHP error level has been enabled on the particular server. A remote attacker could use this flaw to obtain full path location of particular requested DokuWiki page by issuing a specially-crafted HTTP POST request. References: [1] <a href="http://www.openwall.com/lists/oss-security/2012/06/24/2">http://www.openwall.com/lists/oss-security/2012/06/24/2</a> [2] <a href="http://www.openwall.com/lists/oss-security/2012/06/25/2">http://www.openwall.com/lists/oss-security/2012/06/25/2</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
DokuWiki | ||
Red Hat Fedora | =16 | |
Red Hat Fedora | =17 | |
Red Hat Fedora | =18 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-3354 has a medium severity rating due to its potential for information disclosure.
To fix CVE-2012-3354, update DokuWiki to the latest version where the flaw has been patched.
CVE-2012-3354 impacts users of DokuWiki on specific versions of Fedora including 16, 17, and 18.
CVE-2012-3354 is a full path disclosure vulnerability that can expose sensitive path information.
Yes, CVE-2012-3354 can be exploited remotely by an attacker when PHP error reporting is enabled.