Unrated severityNVD Advisory· Published Dec 17, 2014· Updated May 6, 2026
CVE-2014-9253
CVE-2014-9253
Description
The default file type whitelist configuration in conf/mime.conf in the Media Manager in DokuWiki before 2014-09-29b allows remote attackers to execute arbitrary web script or HTML by uploading an SWF file, then accessing it via the media parameter to lib/exe/fetch.php.
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- github.com/splitbrain/dokuwiki/commit/778ddf6f2cd9ed38b9db2d73e823b8c21243a960nvdIssue TrackingPatch
- advisories.mageia.org/MGASA-2014-0540.htmlnvdThird Party Advisory
- seclists.org/oss-sec/2014/q4/1050nvdThird Party AdvisoryVDB Entry
- security.szurek.pl/dokuwiki-20140929a-xss.htmlnvdThird Party Advisory
- www.securitytracker.com/id/1031369nvdThird Party AdvisoryVDB Entry
- www.securityfocus.com/bid/71671nvdNot Applicable
- www.dokuwiki.org/changesnvdRelease Notes
- exchange.xforce.ibmcloud.com/vulnerabilities/99291nvd
News mentions
0No linked articles in our index yet.