(#A vulnerability was reported in Didiwiki.#A remote attacker could exploit it by using a specific URL in order to access arbitrary file on the system with the privileges of the process.##This vulnerability stems from an lack of user input validation for parameter "page" of the "http://localhost:8000/api/page/get" web page.##A proof of concept is available.)
Vulnerable Products
Vulnerable OS: GNU/Linux (Debian) - 6, 7, 8
Solution
Following a regression, new fixed didiwiki packages for Debian Wheezy 7 and Jessie 8 are available.