Unrestricted file upload vulnerability in jhot.php in TikiWiki 1.9.4 Sirius and earlier allows remote attackers to execute arbitrary PHP code via a filepath parameter that contains a filename with a .php extension, which is uploaded to the img/wiki/ directory.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Tikiwiki_cms/groupware | Tiki | 1.9.4 (including) | 1.9.4 (including) |