Bug 835145 (CVE-2012-3354) - CVE-2012-3354 dokuwiki: Full path disclosure with PHP error level enabled
Summary: CVE-2012-3354 dokuwiki: Full path disclosure with PHP error level enabled
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2012-3354
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard: impact=low,public=20120624,reported=2...
Depends On: 835149 835150
Blocks:
TreeView+ depends on / blocked
 
Reported: 2012-06-25 16:48 UTC by Jan Lieskovsky
Modified: 2019-06-08 19:10 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2012-11-12 15:25:06 UTC


Attachments (Terms of Use)

Description Jan Lieskovsky 2012-06-25 16:48:09 UTC
A full path disclosure flaw was found in the way DokuWiki, a standards compliant, simple to use Wiki, performed sanitization of HTTP POST 'prefix' input value prior passing it to underlying PHP substr() routine, when the PHP error level has been enabled on the particular server. A remote attacker could use this flaw to obtain full path location of particular requested DokuWiki page by issuing a specially-crafted HTTP POST request.

References:
[1] http://www.openwall.com/lists/oss-security/2012/06/24/2
[2] http://www.openwall.com/lists/oss-security/2012/06/25/2

Comment 1 Jan Lieskovsky 2012-06-25 16:53:30 UTC
This issue affects the versions of the dokuwiki package, as shipped with Fedora release of 16 and 17. Please schedule an update (once final upstream patch available).

--

This issue affects the versions of the dokuwiki package, as shipped with Fedora EPEL 5 and 6. Please schedule an update (once final upstream patch available).

Comment 2 Jan Lieskovsky 2012-06-25 16:54:25 UTC
Created dokuwiki tracking bugs for this issue

Affects: fedora-all [bug 835149]
Affects: epel-all [bug 835150]


Note You need to log in before you can comment on or make changes to this bug.