Vulnerabilities > CVE-2011-4451 - Unspecified vulnerability in Wikkawiki 1.3.1/1.3.2

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
wikkawiki
exploit available
metasploit

Summary

libs/Wakka.class.php in WikkaWiki 1.3.1 and 1.3.2, when the spam_logging option is enabled, allows remote attackers to write arbitrary PHP code to the spamlog_path file via the User-Agent HTTP header in an addcomment request. NOTE: the vendor disputes this issue because the rendering of the spamlog_path file never uses the PHP interpreter

Vulnerable Configurations

Part Description Count
Application
Wikkawiki
2

D2sec

nameWikkaWiki 1.3.1 SQL Injection
urlhttp://www.d2sec.com/exploits/wikkawiki_1.3.1_sql_injection.html

Exploit-Db

descriptionWikkaWiki <= 1.3.2 - Multiple Security Vulnerabilities. CVE-2011-4448,CVE-2011-4449,CVE-2011-4450,CVE-2011-4451,CVE-2011-4452. Webapps exploit for php pla...
idEDB-ID:18177
last seen2016-02-02
modified2011-11-30
published2011-11-30
reporterEgiX
sourcehttps://www.exploit-db.com/download/18177/
titleWikkaWiki <= 1.3.2 - Multiple Security Vulnerabilities

Metasploit

descriptionThis module exploits a vulnerability found in WikkaWiki. When the spam logging feature is enabled, it is possible to inject PHP code into the spam log file via the UserAgent header, and then request it to execute our payload. There are at least three different ways to trigger spam protection, this module does so by generating 10 fake URLs in a comment (by default, the max_new_comment_urls parameter is 6). Please note that in order to use the injection, you must manually pick a page first that allows you to add a comment, and then set it as 'PAGE'.
idMSF:EXPLOIT/MULTI/HTTP/WIKKA_SPAM_EXEC
last seen2020-06-04
modified2017-09-08
published2012-05-10
referenceshttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4451
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/multi/http/wikka_spam_exec.rb
titleWikkaWiki 1.3.2 Spam Logging PHP Injection

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/107405/wikkawiki-sqlshellexec.txt
idPACKETSTORM:107405
last seen2016-12-05
published2011-11-30
reporterEgiX
sourcehttps://packetstormsecurity.com/files/107405/WikkaWiki-1.3.2-Code-Execution-Shell-Upload-SQL-Injection.html
titleWikkaWiki 1.3.2 Code Execution / Shell Upload / SQL Injection

Seebug

  • bulletinFamilyexploit
    descriptionNo description provided by source.
    idSSV:24270
    last seen2017-11-19
    modified2011-12-01
    published2011-12-01
    reporterRoot
    sourcehttps://www.seebug.org/vuldb/ssvid-24270
    titleWikkaWiki &lt;= 1.3.2 Multiple Security Vulnerabilities
  • bulletinFamilyexploit
    descriptionNo description provided by source.
    idSSV:72373
    last seen2017-11-19
    modified2014-07-01
    published2014-07-01
    reporterRoot
    sourcehttps://www.seebug.org/vuldb/ssvid-72373
    titleWikkaWiki <= 1.3.2 - Multiple Security Vulnerabilities