Description
inc/init.php in DokuWiki 2009-02-14, rc2009-02-06, and rc2009-01-30, when register_globals is enabled, allows remote attackers to include and execute arbitrary local files via the config_cascade[main][default][] parameter to doku.php. NOTE: PHP remote file inclusion is also possible in PHP 5 using ftp:// URLs.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Nine:Situations:Group · textwebappsphp
https://www.exploit-db.com/exploits/8812
References (6)
Core 6
Core References
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/8812
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/35095
Patch x_refsource_confirm
http://bugs.splitbrain.org/index.php?do=details&task_id=1700
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/35218
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/8781
Various Sources x_refsource_confirm
http://dev.splitbrain.org/darcsweb/darcsweb.cgi?r=dokuwiki%3Ba=commitdiff%3Bh=20090526145030-7ad00-c0483e021f47898c8597f3bfbdd26c637f891d86.gz
Scores
EPSS
0.3904
EPSS Percentile
97.3%
Details
CWE
CWE-94
Status
published
Products (3)
dokuwiki/dokuwiki
2009-02-14
dokuwiki/dokuwiki
rc2009-01-30
dokuwiki/dokuwiki
rc2009-02-06
Published
Jun 08, 2009
Tracked Since
Feb 18, 2026