Multiple vulnerabilities have been discovered in TikiWiki, possibly resulting in the remote execution of arbitrary code.
|Package||www-apps/tikiwiki on all architectures|
|Affected versions||< 126.96.36.199|
|Unaffected versions||>= 188.8.131.52|
TikiWiki is an open source content management system written in PHP.
Stefan Esser reported that a previous vulnerability (CVE-2007-5423, GLSA 200710-21) was not properly fixed in TikiWiki 184.108.40.206 (CVE-2007-5682). The TikiWiki development team also added several checks to avoid file inclusion.
A remote attacker could exploit these vulnerabilities to inject arbitrary code with the privileges of the user running the application.
There is no known workaround at this time.
All TikiWiki users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=www-apps/tikiwiki-220.127.116.11"
November 14, 2007
November 14, 2007: 01