lib/exec/fetch.php in DokuWiki before 2006-03-09e, when conf[imconvert] is configured to use ImageMagick, allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) w and (2) h parameters, which are not filtered when invoking convert.
References
Link | Resource |
---|---|
http://bugs.splitbrain.org/?do=details&id=926 | Exploit |
http://secunia.com/advisories/22192 | Patch Vendor Advisory |
http://secunia.com/advisories/22199 | Patch Vendor Advisory |
http://security.gentoo.org/glsa/glsa-200609-20.xml | Patch |
http://www.vupen.com/english/advisories/2006/3851 |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2006-09-29T23:00:00
Updated: 2006-10-05T09:00:00
Reserved: 2006-09-29T00:00:00
Link: CVE-2006-5099
JSON object: View
NVD Information
Status : Modified
Published: 2006-09-29T23:07:00.000
Modified: 2011-03-08T02:42:34.143
Link: CVE-2006-5099
JSON object: View
Redhat Information
No data.
CWE