TikiWiki versions 1.9.8 and below contain a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to 'tiki-graph_formula.php' script not properly sanitizing user input supplied to the f variable, which may allow a remote attacker to execute arbitrary PHP commands resulting in a loss of integrity.
2c4a8a6e81f67352e72024e2f545f7d1ae145048bf376afb7ae97d09bf473fe9
Gentoo Linux Security Advisory GLSA 200711-19 - Stefan Esser reported that a previous vulnerability was not properly fixed in TikiWiki 1.9.8.1. The TikiWiki development team also added several checks to avoid file inclusion. Versions less than 1.9.8.3 are affected.
99b2b391e1b8c4e7204fab5ec76d9d88dc7a636333069e52a5271779d50ea093
Gentoo Linux Security Advisory GLSA 200710-21 - ShAnKaR reported that input passed to the f array parameter in tiki-graph_formula.php is not properly verified before being used to execute PHP functions. Versions less than 1.9.8.1 are affected.
0ef6380a3939fe01e3051813b00318d71adcc9166c947248f42deec8ad769fca