Vulnerabilities > CVE-2012-0911 - Deserialization of Untrusted Data vulnerability in Tiki Tikiwiki Cms/Groupware
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
TikiWiki CMS/Groupware before 6.7 LTS and before 8.4 allows remote attackers to execute arbitrary PHP code via a crafted serialized object in the (1) cookieName to lib/banners/bannerlib.php; (2) printpages or (3) printstructures parameter to (a) tiki-print_multi_pages.php or (b) tiki-print_pages.php; or (4) sendpages, (5) sendstructures, or (6) sendarticles parameter to tiki-send_objects.php, which is not properly handled when processed by the unserialize function.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 |
Common Weakness Enumeration (CWE)
D2sec
name | Tiki Wiki CMS Groupware 8.3 RCE |
url | http://www.d2sec.com/exploits/tiki_wiki_cms_groupware_8.3_rce.html |
Exploit-Db
description Tiki Wiki. CVE-2012-0911. Webapps exploit for php platform file exploits/php/webapps/19630.rb id EDB-ID:19630 last seen 2016-02-02 modified 2012-07-09 platform php port published 2012-07-09 reporter metasploit source https://www.exploit-db.com/download/19630/ title Tiki Wiki <= 8.3 unserialize PHP Code Execution type webapps description Tiki Wiki CMS Groupware <= 8.3 - "unserialize()" PHP Code Execution. CVE-2012-0911. Webapps exploit for php platform file exploits/php/webapps/19573.php id EDB-ID:19573 last seen 2016-02-02 modified 2012-07-04 platform php port published 2012-07-04 reporter EgiX source https://www.exploit-db.com/download/19573/ title Tiki Wiki CMS Groupware <= 8.3 - "unserialize" PHP Code Execution type webapps
Metasploit
description | This module exploits a php unserialize() vulnerability in Tiki Wiki <= 8.3 which could be abused to allow unauthenticated users to execute arbitrary code under the context of the webserver user. The dangerous unserialize() exists in the 'tiki-print_multi_pages.php' script, which is called with user controlled data from the 'printpages' parameter. The exploit abuses the __destruct() method from the Zend_Pdf_ElementFactory_Proxy class to write arbitrary PHP code to a file on the Tiki Wiki web directory. In order to run successfully three conditions must be satisfied (1) display_errors php setting must be On to disclose the filesystem path of Tiki Wiki, (2) The Tiki Wiki Multiprint feature must be enabled to exploit the unserialize() and (3) a php version older than 5.3.4 must be used to allow poison null bytes in filesystem related functions. The exploit has been tested successfully on Ubuntu 9.10 and Tiki Wiki 8.3. |
id | MSF:EXPLOIT/UNIX/WEBAPP/TIKIWIKI_UNSERIALIZE_EXEC |
last seen | 2020-03-24 |
modified | 2019-08-02 |
published | 2012-07-05 |
references | |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/unix/webapp/tikiwiki_unserialize_exec.rb |
title | Tiki Wiki unserialize() PHP Code Execution |
Nessus
NASL family | CGI abuses |
NASL id | TIKIWIKI_UNSERIALIZE_CODE_EXECUTION.NASL |
description | The version of the TikiWiki installed on the remote host contains a flaw that could allow a remote attacker to execute arbitrary code. The |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 61733 |
published | 2012-08-30 |
reporter | This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/61733 |
title | TikiWiki unserialize() Function Arbitrary Code Execution |
code |
|
Packetstorm
data source https://packetstormsecurity.com/files/download/114479/tikiwikicms-exec.txt id PACKETSTORM:114479 last seen 2016-12-05 published 2012-07-04 reporter EgiX source https://packetstormsecurity.com/files/114479/Tiki-Wiki-CMS-Groupware-8.3-Code-Execution.html title Tiki Wiki CMS Groupware 8.3 Code Execution data source https://packetstormsecurity.com/files/download/114526/tikiwiki_unserialize_exec.rb.txt id PACKETSTORM:114526 last seen 2016-12-05 published 2012-07-06 reporter EgiX source https://packetstormsecurity.com/files/114526/Tiki-Wiki-8.3-unserialize-PHP-Code-Execution.html title Tiki Wiki <= 8.3 unserialize() PHP Code Execution
Seebug
bulletinFamily exploit description Bugtraq ID: 54298 CVE ID:CVE-2012-0911 Tiki Wiki CMS Groupware是一款内容管理和协作系统。 Tiki Wiki CMS Groupware多个脚本使用用户可控的输入调用"unserialize()",这可导致通过传递ad-hoc Zend Framework序列化对象来执行任意PHP代码。 0 Tiki Wiki CMS Groupware <= 8.3 厂商补丁: Tiki Wiki ----- Tiki Wiki CMS Groupware 8.4已经修复此漏洞,建议用户下载使用: http://info.tiki.org/article191-Tiki-Releases-8-4 id SSV:60261 last seen 2017-11-19 modified 2012-07-06 published 2012-07-06 reporter Root source https://www.seebug.org/vuldb/ssvid-60261 title Tiki Wiki CMS Groupware 'unserialize()' PHP代码执行漏洞 bulletinFamily exploit description ## Tiki Wiki CMS Groupware 'unserialize()'多个远程PHP代码执行漏洞 ## 漏洞类型: 设计缺陷 ## 漏洞成因: Tiki Wiki CMS Groupware v6.9、9.3之前版本存在安全漏洞,某些脚本对用户控制的输入使用了 "unserialize()"操作,攻击者可利用此漏洞在受影响应用中注入和执行任意PHP代码。 ## 修补建议: 更新到最新版本 http://info.tiki.org/article210-Tiki-10-0-is-here id SSV:73494 last seen 2017-11-19 modified 2014-07-01 published 2014-07-01 reporter Root source https://www.seebug.org/vuldb/ssvid-73494 title Tiki Wiki CMS Groupware <= 8.3 "unserialize()" PHP Code Execution
References
- http://dev.tiki.org/item4109
- http://info.tiki.org/article191-Tiki-Releases-8-4
- http://osvdb.org/83534
- http://archives.neohapsis.com/archives/bugtraq/2012-07/0020.html
- http://info.tiki.org/article190-Tiki-Wiki-CMS-Groupware-Updates-Tiki-6-7-LTS
- http://www.securityfocus.com/bid/54298
- http://www.exploit-db.com/exploits/19573
- http://www.exploit-db.com/exploits/19630
- https://exchange.xforce.ibmcloud.com/vulnerabilities/76758