First published: Mon Jun 25 2012(Updated: )
A full path disclosure flaw was found in the way DokuWiki, a standards compliant, simple to use Wiki, performed sanitization of HTTP POST 'prefix' input value prior passing it to underlying PHP substr() routine, when the PHP error level has been enabled on the particular server. A remote attacker could use this flaw to obtain full path location of particular requested DokuWiki page by issuing a specially-crafted HTTP POST request. References: [1] <a href="http://www.openwall.com/lists/oss-security/2012/06/24/2">http://www.openwall.com/lists/oss-security/2012/06/24/2</a> [2] <a href="http://www.openwall.com/lists/oss-security/2012/06/25/2">http://www.openwall.com/lists/oss-security/2012/06/25/2</a>
Affected Software | Affected Version | How to fix |
---|---|---|
DokuWiki |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-835145 is considered medium due to the potential for information disclosure.
To mitigate REDHAT-BUG-835145, ensure that you properly sanitize the HTTP POST inputs and adjust the PHP error reporting settings.
REDHAT-BUG-835145 specifically affects DokuWiki, a simple to use wiki software.
Yes, REDHAT-BUG-835145 can be exploited remotely by an attacker if the server's PHP error level is enabled.
REDHAT-BUG-835145 is categorized as a full path disclosure vulnerability.