First published: Thu Jul 12 2012(Updated: )
TikiWiki CMS/Groupware 8.3 and earlier allows remote attackers to obtain the installation path via a direct request to (1) admin/include_calendar.php, (2) tiki-rss_error.php, or (3) tiki-watershed_service.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tiki Wiki CMS Groupware | <=8.2 | |
Tiki Wiki CMS Groupware | =2.2 | |
Tiki Wiki CMS Groupware | =3.0 | |
Tiki Wiki CMS Groupware | =3.1 | |
Tiki Wiki CMS Groupware | =3.2 | |
Tiki Wiki CMS Groupware | =3.3 | |
Tiki Wiki CMS Groupware | =3.4 | |
Tiki Wiki CMS Groupware | =3.5 | |
Tiki Wiki CMS Groupware | =4 | |
Tiki Wiki CMS Groupware | =4.0 | |
Tiki Wiki CMS Groupware | =4.1 | |
Tiki Wiki CMS Groupware | =4.2 | |
Tiki Wiki CMS Groupware | =5.0 | |
Tiki Wiki CMS Groupware | =5.1 | |
Tiki Wiki CMS Groupware | =5.2 | |
Tiki Wiki CMS Groupware | =5.3 | |
Tiki Wiki CMS Groupware | =6.0 | |
Tiki Wiki CMS Groupware | =6.1 | |
Tiki Wiki CMS Groupware | =6.2 | |
Tiki Wiki CMS Groupware | =7.0 | |
Tiki Wiki CMS Groupware | =7.1 | |
Tiki Wiki CMS Groupware | =7.2 | |
Tiki Wiki CMS Groupware | =8.0 | |
Tiki Wiki CMS Groupware | =8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-3996 is considered a moderate severity vulnerability as it allows remote attackers to disclose sensitive information.
To mitigate CVE-2012-3996, upgrade to TikiWiki CMS/Groupware version 8.4 or later.
Affected versions include TikiWiki CMS/Groupware 8.3 and earlier.
CVE-2012-3996 is a path disclosure vulnerability that allows attackers to obtain installation paths.
Yes, CVE-2012-3996 can be exploited remotely through direct requests to vulnerable scripts.