Short Name |
HTTP:PHP:TIKIWIKI-FORM |
---|---|
Severity |
Major |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
TikiWiki tiki-graph_formula Remote Command Execution |
Release Date |
2009/10/20 |
Update Number |
1527 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known vulnerability against TikiWiki CMS/Groupware. A successful attack can lead to arbitrary code execution.
TikiWiki is prone to a remote PHP code-injection vulnerability. An attacker can exploit this issue to inject and execute arbitrary malicious PHP code in the context of the webserver process. This may facilitate a compromise of the application and the underlying system; other attacks are also possible. TikiWiki 1.9.8 is vulnerable; other versions may also be affected.