Tiki 8.2 and earlier allows remote administrators to execute arbitrary PHP code via crafted input to the regexres and regex parameters.
References
Link | Resource |
---|---|
https://packetstormsecurity.com/files/108111/Tiki-Wiki-CMS-Groupware-8.2-Code-Injection.html | Exploit Third Party Advisory VDB Entry |
https://packetstormsecurity.com/files/108111/Tiki-Wiki-CMS-Groupware-8.2-Code-Injection.html | Exploit Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 01:32
Type | Values Removed | Values Added |
---|---|---|
References | () https://packetstormsecurity.com/files/108111/Tiki-Wiki-CMS-Groupware-8.2-Code-Injection.html - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2020-01-27 15:15
Updated : 2024-11-21 01:32
NVD link : CVE-2011-4558
Mitre link : CVE-2011-4558
CVE.ORG link : CVE-2011-4558
JSON object : View
Products Affected
tiki
- tiki
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')