Summary
The host is running PmWiki and is prone to PHP code injection vulnerability.
Impact
Successful exploitation will allow remote attackers to inject and execute arbitrary PHP code in the context of the affected application.
Impact Level: Application
Solution
Upgrade to PmWiki version 2.2.35 or later,
For updates refer to http://pmwiki.org/pub/pmwiki
Insight
The flaw is due to improper validation of user-supplied input via the 'order' argument of a pagelist directive within a PmWiki page, which allows attackers to execute arbitrary PHP code.
Affected
PmWiki versions 2.0.0 to 2.2.34
References
Severity
Classification
-
CVE CVE-2011-4453 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities