TikiWiki includes PHP XML-RPC code, making it vulnerable to arbitrary command execution.
|Package||www-apps/tikiwiki on all architectures|
|Affected versions||< 1.8.5-r1|
|Unaffected versions||>= 1.8.5-r1|
TikiWiki is a web-based groupware and content management system (CMS), using PHP, ADOdb and Smarty. TikiWiki includes vulnerable PHP XML-RPC code.
TikiWiki is vulnerable to arbitrary command execution as described in GLSA 200507-01.
A remote attacker could exploit this vulnerability to execute arbitrary PHP code by sending specially crafted XML data.
There is no known workaround at this time.
All TikiWiki users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=www-apps/tikiwiki-1.8.5-r1"
July 06, 2005
July 06, 2005: 01