First published: Sat Feb 03 2018(Updated: )
The call parameter of /lib/exe/ajax.php in DokuWiki through 2017-02-19e does not properly encode user input, which leads to a reflected file download vulnerability, and allows remote attackers to run arbitrary programs.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
DokuWiki | <=2017-02-19e | |
Debian | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-18123 has a medium severity rating that indicates it poses a risk of reflected file download exploitation.
To fix CVE-2017-18123, update DokuWiki to a version later than 2017-02-19e that includes the necessary security patches.
CVE-2017-18123 affects DokuWiki versions up to and including 2017-02-19e and Debian Linux version 7.0.
CVE-2017-18123 is classified as a reflected file download vulnerability that allows attackers to execute arbitrary programs remotely.
Yes, CVE-2017-18123 could potentially lead to data breaches by allowing unauthorized execution of commands on a vulnerable system.