First published: Wed Dec 17 2014(Updated: )
The default file type whitelist configuration in conf/mime.conf in the Media Manager in DokuWiki before 2014-09-29b allows remote attackers to execute arbitrary web script or HTML by uploading an SWF file, then accessing it via the media parameter to lib/exe/fetch.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
DokuWiki | <=2014-05-05c | |
Mageia | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9253 is classified as a high severity vulnerability due to its potential to allow remote attackers to execute arbitrary web scripts.
To fix CVE-2014-9253, you should update DokuWiki to the latest version released after 2014-09-29b.
CVE-2014-9253 is exploited through the uploading of SWF files which can lead to script execution.
Versions of DokuWiki prior to 2014-09-29b, specifically those up to 2014-05-05c, are affected by CVE-2014-9253.
The attack vector for CVE-2014-9253 involves uploading a crafted SWF file and then accessing it through the media parameter in fetch.php.