Description
Tiki CMS/Groupware (TikiWiki) 1.8.1 and earlier allows remote attackers to gain sensitive information via a direct request to (1) banner_click.php, (2) categorize.php, (3) tiki-admin_include_directory.php, (4) tiki-directory_search.php, which reveal the web server path in an error message.
Exploits (2)
References (5)
Core 5
Core References
Exploit, Patch, Vendor Advisory vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/10100
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=108180073206947&w=2
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/11344
Patch x_refsource_confirm
http://tikiwiki.org/tiki-read_article.php?articleId=66
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/15847
Scores
EPSS
0.0674
EPSS Percentile
91.3%
Details
CWE
CWE-200
Status
published
Products (2)
tiki/tikiwiki_cms\/groupware
1.6.1
tiki/tikiwiki_cms\/groupware
< 1.8.1
Published
Apr 11, 2004
Tracked Since
Feb 18, 2026