CVE-2009-1960
Summary
| CVE | CVE-2009-1960 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2009-06-08 01:00:00 UTC |
| Updated | 2023-11-07 02:04:00 UTC |
| Description | inc/init.php in DokuWiki 2009-02-14, rc2009-02-06, and rc2009-01-30, when register_globals is enabled, allows remote attackers to include and execute arbitrary local files via the config_cascade[main][default][] parameter to doku.php. NOTE: PHP remote file inclusion is also possible in PHP 5 using ftp:// URLs. |
Risk And Classification
Problem Types: CWE-94
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Dokuwiki | Dokuwiki | 2009-02-14 | All | All | All |
| Application | Dokuwiki | Dokuwiki | rc2009-01-30 | All | All | All |
| Application | Dokuwiki | Dokuwiki | rc2009-02-06 | All | All | All |
| Application | Dokuwiki | Dokuwiki | 2009-02-14 | All | All | All |
| Application | Dokuwiki | Dokuwiki | rc2009-01-30 | All | All | All |
| Application | Dokuwiki | Dokuwiki | rc2009-02-06 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Dokuwiki 2009-02-14 Remote/Temporary File Inclusion exploit | EXPLOIT-DB | www.exploit-db.com | |
| DokuWiki "config_cascade" File Inclusion Vulnerability - Secunia Advisories - Vulnerability Information - Secunia.com | SECUNIA | secunia.com | Vendor Advisory |
| dev.splitbrain.org/darcsweb/darcsweb.cgi | dev.splitbrain.org | ||
| Dokuwiki 'doku.php' Local File Include Vulnerability | BID | www.securityfocus.com | |
| FS#1700 : Local File Inclusion with register_globals on | CONFIRM | bugs.splitbrain.org | Patch |
| dev.splitbrain.org/darcsweb/darcsweb.cgi | CONFIRM | dev.splitbrain.org | |
| Dokuwiki 2009-02-14 Local File Inclusion Vulnerability | EXPLOIT-DB | www.exploit-db.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.