Local File Inclusion Vulnerability in Tiki Wiki CMS by Tiki Wiki CMS Groupware
CVE-2010-4239

9.8CRITICAL

Key Information:

Vendor

Tiki Wiki

Vendor
CVE Published:
28 October 2019

Badges

๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC๐ŸŸฃ EPSS 55%

What is CVE-2010-4239?

Tiki Wiki CMS Groupware 5.2 is vulnerable to Local File Inclusion (LFI), which allows attackers to exploit the system and potentially access sensitive files. This vulnerability can lead to unauthorized disclosures and compromise the integrity of the server. By manipulating file paths, an attacker could gain access to critical system files and execute arbitrary commands, posing significant risks to the security and privacy of the application.

Affected Version(s)

CMS Groupware 5.2

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

EPSS Score

55% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.