Executive Summary

Informations
Name CVE-2009-1960 First vendor Publication 2009-06-07
Vendor Cve Last vendor Modification 2023-11-07

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

inc/init.php in DokuWiki 2009-02-14, rc2009-02-06, and rc2009-01-30, when register_globals is enabled, allows remote attackers to include and execute arbitrary local files via the config_cascade[main][default][] parameter to doku.php. NOTE: PHP remote file inclusion is also possible in PHP 5 using ftp:// URLs.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1960

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-94 Failure to Control Generation of Code ('Code Injection')

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 3

OpenVAS Exploits

Date Description
2009-09-02 Name : Gentoo Security Advisory GLSA 200908-09 (dokuwiki)
File : nvt/glsa_200908_09.nasl
2009-06-19 Name : DokuWiki 'doku.php' Local File Inclusion Vulnerability
File : nvt/gb_dokuwiki_local_file_inc_vuln.nasl
2009-06-09 Name : FreeBSD Ports: dokuwiki
File : nvt/freebsd_dokuwiki4.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
54740 DokuWiki doku.php config_cascade[main][default][] Parameter Remote File Inclu...

DokuWiki contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the 'doku.php' script not properly sanitizing user input supplied to the 'config_cascade[main][default][]' parameter. This may allow an attacker to include a file from an arbitrary remote host that contains commands which will be executed by the vulnerable script with the same privileges as the web server.

Snort® IPS/IDS

Date Description
2014-01-10 DokuWiki PHP file inclusion attempt
RuleID : 27226 - Revision : 4 - Type : SERVER-WEBAPP

Nessus® Vulnerability Scanner

Date Description
2009-08-20 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-200908-09.nasl - Type : ACT_GATHER_INFO
2009-06-05 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_4f838b7450a111deb01f001c2514716c.nasl - Type : ACT_GATHER_INFO
2009-05-27 Name : The remote web server contains PHP script that is affected by a remote file i...
File : dokuwiki_config_cascade_rfi.nasl - Type : ACT_ATTACK

Sources (Detail)

http://dev.splitbrain.org/darcsweb/darcsweb.cgi?r=dokuwiki%3Ba=commitdiff%3Bh...
Source Url
BID http://www.securityfocus.com/bid/35095
CONFIRM http://bugs.splitbrain.org/index.php?do=details&task_id=1700
EXPLOIT-DB https://www.exploit-db.com/exploits/8781
https://www.exploit-db.com/exploits/8812
SECUNIA http://secunia.com/advisories/35218

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
Date Informations
2023-11-07 21:47:42
  • Multiple Updates
2021-05-04 12:09:41
  • Multiple Updates
2021-04-22 01:10:01
  • Multiple Updates
2020-05-23 00:23:53
  • Multiple Updates
2017-09-29 09:24:15
  • Multiple Updates
2016-04-26 18:52:53
  • Multiple Updates
2014-02-17 10:50:24
  • Multiple Updates
2014-01-19 21:25:58
  • Multiple Updates
2013-05-10 23:51:58
  • Multiple Updates