CVE-2011-4451

libs/Wakka.class.php in WikkaWiki 1.3.1 and 1.3.2, when the spam_logging option is enabled, allows remote attackers to write arbitrary PHP code to the spamlog_path file via the User-Agent HTTP header in an addcomment request. NOTE: the vendor disputes this issue because the rendering of the spamlog_path file never uses the PHP interpreter
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:wikkawiki:wikkawiki:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:wikkawiki:wikkawiki:1.3.2:*:*:*:*:*:*:*

History

21 Nov 2024, 01:32

Type Values Removed Values Added
References () http://wush.net/trac/wikka/ticket/1098 - Exploit () http://wush.net/trac/wikka/ticket/1098 - Exploit

07 Nov 2023, 02:09

Type Values Removed Values Added
Summary ** DISPUTED ** libs/Wakka.class.php in WikkaWiki 1.3.1 and 1.3.2, when the spam_logging option is enabled, allows remote attackers to write arbitrary PHP code to the spamlog_path file via the User-Agent HTTP header in an addcomment request. NOTE: the vendor disputes this issue because the rendering of the spamlog_path file never uses the PHP interpreter. libs/Wakka.class.php in WikkaWiki 1.3.1 and 1.3.2, when the spam_logging option is enabled, allows remote attackers to write arbitrary PHP code to the spamlog_path file via the User-Agent HTTP header in an addcomment request. NOTE: the vendor disputes this issue because the rendering of the spamlog_path file never uses the PHP interpreter

Information

Published : 2012-09-05 20:55

Updated : 2024-11-21 01:32


NVD link : CVE-2011-4451

Mitre link : CVE-2011-4451

CVE.ORG link : CVE-2011-4451


JSON object : View

Products Affected

wikkawiki

  • wikkawiki