MGASA-2012-0362
Date: | December 11th, 2012 |
Affected releases: | 2 |
Description:
Updated dokuwiki package fixes security vulnerabilities:
DokuWiki 2009-12-25c allows remote attackers to obtain sensitive
information via a direct request to a .php file, which reveals the
installation path in an error message, as demonstrated by
lib/tpl/index.php and certain other files (CVE-2011-3727).
A full path disclosure flaw was found in the way DokuWiki, a standards
compliant, simple to use Wiki, performed sanitization of HTTP POST
'prefix' input value prior passing it to underlying PHP substr() routine,
when the PHP error level has been enabled on the particular server.
A remote attacker could use this flaw to obtain full path location
of particular requested DokuWiki page by issuing a specially-crafted
HTTP POST request (CVE-2012-3354).
Updated Packages:
dokuwiki-20121013-1.mga2
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3727
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3354
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090899.html
https://bugs.mageia.org/show_bug.cgi?id=7950