Directory traversal vulnerability in wiki.c in didiwiki allows remote attackers to read arbitrary files via the page parameter to api/page/get.
References
Configurations
History
21 Nov 2024, 02:01
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.debian.org/security/2016/dsa-3485 - | |
References | () http://www.openwall.com/lists/oss-security/2016/02/19/4 - | |
References | () http://www.openwall.com/lists/oss-security/2016/02/19/5 - | |
References | () http://www.openwall.com/lists/oss-security/2016/02/19/6 - | |
References | () http://www.openwall.com/lists/oss-security/2016/02/19/7 - | |
References | () https://github.com/OpenedHand/didiwiki/pull/1/files - | |
References | () https://github.com/yarolig/didiwiki/commit/5e5c796617e1712905dc5462b94bd5e6c08d15ea - |
Information
Published : 2016-02-23 19:59
Updated : 2024-11-21 02:01
NVD link : CVE-2013-7448
Mitre link : CVE-2013-7448
CVE.ORG link : CVE-2013-7448
JSON object : View
Products Affected
didiwiki_project
- didiwiki
debian
- debian_linux
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')