DokuWiki: Local file inclusion An input sanitation error in DokuWiki might lead to the dislosure of local files or even the remote execution of arbitrary code. dokuwiki August 18, 2009 August 19, 2009: 02 272431 remote 20090214b 20090214b

DokuWiki is a standards compliant Wiki system written in PHP.

girex reported that data from the "config_cascade" parameter in inc/init.php is not properly sanitized before being used.

A remote attacker could exploit this vulnerability to execute PHP code from arbitrary local, or, when the used PHP version supports ftp:// URLs, also from remote files via FTP. Furthermore, it is possible to disclose the contents of local files. NOTE: Successful exploitation requires the PHP option "register_globals" to be enabled.

Disable "register_globals" in php.ini.

All DokuWiki users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=www-apps/dokuwiki-2009-02-14b"
CVE-2009-1960 a3li a3li a3li