JVN#05187780
Hiki arbitrary file deletion vulnerability
Overview
Hiki, a Wiki clone software developed by Hiki Development Team, contains a vulnerability that may allow a remote attacker to delete arbitrary files.
Products Affected
- Hiki 0.8.0 - 0.8.6
Description
Hiki contains a vulnerability that allows an arbitrary file to be deleted on a server running Hiki. This is caused by the improper handling of a session management file.
Impact
A remote attacker may be able to delete arbitrary files with the privilege of the user running Hiki.
Solution
Upgrade the software
The developer has released Hiki 0.8.7 which contains the fix for this vulnerability. We recommend that affected users upgrade their software to the fixed version.
Vendor Status
Vendor | Link |
HikiWiki |
http://hikiwiki.org/ja/advisory20070624.html |
http://hikiwiki.org/ja/download.html |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Analyzed on 2007.06.25
Measures | Conditions | Severity |
---|---|---|
Access Required | Routed - can be attacked over the Internet using packets |
|
Authentication | None - anonymous or no authentication (IP addresses do not count) |
|
User Interaction Required | None - the vulnerability can be exploited without an honest user taking any action |
|
Exploit Complexity | Low-Medium - some expertise and/or luck required (most buffer overflows, guessing correctly in small space, expertise in Windows function calls) |
|
Credit
Kazuhiro Nishiyama reported this vulnerability to IPA.
JPCERT/CC coordinated with the vendors under Information Security Early Warning Partnership.
Other Information
JPCERT Alert | |
JPCERT Reports | |
CERT Advisory | |
CPNI Advisory | |
TRnotes | |
CVE | |
JVN iPedia |
JVNDB-2007-000476 |