TikiWiki: Arbitrary command execution through XML-RPC TikiWiki includes PHP XML-RPC code, making it vulnerable to arbitrary command execution. Tikiwiki 2005-07-06 2005-07-06 97648 remote 1.8.5-r1 1.8.5-r1

TikiWiki is a web-based groupware and content management system (CMS), using PHP, ADOdb and Smarty. TikiWiki includes vulnerable PHP XML-RPC code.

TikiWiki is vulnerable to arbitrary command execution as described in GLSA 200507-01.

A remote attacker could exploit this vulnerability to execute arbitrary PHP code by sending specially crafted XML data.

There is no known workaround at this time.

All TikiWiki users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=www-apps/tikiwiki-1.8.5-r1"
GLSA 200507-01 CAN-2005-1921 koon koon jaervosz