FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

dokuwiki -- multiple vulnerabilities

Affected packages
dokuwiki < 20060309_5
dokuwiki-devel < 20060609_2

Details

VuXML ID 450b76ee-5068-11db-a5ae-00508d6a62df
Discovery 2006-09-26
Entry 2006-09-30
Modified 2006-10-02

Secunia reports:

Some vulnerabilities have been reported in DokuWiki, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.

Input passed to the "w" and "h" parameters in lib/exec/fetch.php is not properly sanitised before being passed as resize parameters to the "convert" application. This can be exploited to cause a DoS due to excessive CPU and memory consumption by passing very large numbers, or to inject arbitrary shell commands by passing specially crafted strings to the "w" and "h" parameter.

Successful exploitation requires that the "$conf[imconvert]" option is set.

References

CVE Name CVE-2006-5098
CVE Name CVE-2006-5099
URL http://bugs.splitbrain.org/?do=details&id=924
URL http://bugs.splitbrain.org/?do=details&id=926
URL http://secunia.com/advisories/22192/
URL http://secunia.com/advisories/22199/