{ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-2878", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The spellchecker (spellcheck.php) in DokuWiki 2006/06/04 and earlier allows remote attackers to insert and execute arbitrary PHP code via \"complex curly syntax\" that is inserted into a regular expression that is processed by preg_replace with the /e (executable) modifier." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://bugs.splitbrain.org/index.php?do=details&id=823", "refsource": "CONFIRM", "url": "http://bugs.splitbrain.org/index.php?do=details&id=823" }, { "name": "18289", "refsource": "BID", "url": "http://www.securityfocus.com/bid/18289" }, { "name": "20060605 Advisory 04/2006: DokuWiki PHP code execution vulnerability in spellchecker", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/435989/100/0/threaded" }, { "name": "1016221", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016221" }, { "name": "25980", "refsource": "OSVDB", "url": "http://www.osvdb.org/25980" }, { "name": "20429", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20429" }, { "name": "20060605 Advisory 04/2006: DokuWiki PHP code execution vulnerability in spellchecker", "refsource": "FULLDISC", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-June/046602.html" }, { "name": "20669", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20669" }, { "name": "ADV-2006-2142", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/2142" }, { "name": "http://www.hardened-php.net/advisory_042006.119.html", "refsource": "MISC", "url": "http://www.hardened-php.net/advisory_042006.119.html" }, { "name": "dokuwiki-spellchecker-code-execution(26913)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26913" }, { "name": "GLSA-200606-16", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200606-16.xml" } ] } }