Rapid7 Vulnerability & Exploit Database

TikiWiki jhot Remote Command Execution

Back to Search

TikiWiki jhot Remote Command Execution

Disclosed
09/02/2006
Created
05/30/2018

Description

TikiWiki contains a flaw that may allow a malicious user to execute arbitrary PHP code. The issue is triggered due to the jhot.php script not correctly verifying uploaded files. It is possible that the flaw may allow arbitrary PHP code execution by uploading a malicious PHP script resulting in a loss of integrity. The vulnerability was reported in Tikiwiki version 1.9.4.

Author(s)

  • Matteo Cantoni <goony@nothink.org>

Platform

Unix

Architectures

cmd

Development

References

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/unix/webapp/tikiwiki_jhot_exec
msf exploit(tikiwiki_jhot_exec) > show targets
    ...targets...
msf exploit(tikiwiki_jhot_exec) > set TARGET < target-id >
msf exploit(tikiwiki_jhot_exec) > show options
    ...show and set options...
msf exploit(tikiwiki_jhot_exec) > exploit

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;