First published: Wed Dec 17 2014(Updated: )
The default file type whitelist configuration in conf/mime.conf in the Media Manager in DokuWiki before 2014-09-29b allows remote attackers to execute arbitrary web script or HTML by uploading an SWF file, then accessing it via the media parameter to lib/exe/fetch.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dokuwiki Dokuwiki | <=2014-05-05c | |
Mageia Mageia | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.