Jump to content
Sign in to follow this  
TCH-Thomas

Tikiwiki Multiple Vulnerabilities

Recommended Posts

From: Secunia

secunia.com/advisories/28225/

 

Rating: Moderately critical

 

Description:

Some vulnerabilities have been reported in TikiWiki, where some have unknown impacts and others can be exploited by malicious people to conduct cross-site scripting attacks.

 

1) Input passed into the "movies" parameter in tiki-listmovies.php is not properly sanitised before being used, which can be exploited to conduct directory traversal attacks.

 

2) Input passed to the "area_name" parameter in tiki-special_chars.php is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

 

3) Certain unspecified vulnerabilities exist in tiki-edit_css.php, tiki-list_games.php, and tiki-g-admin_shared_source.php. More information is currently not available.

 

Solution:

Update to version 1.9.9.

 

As a workaround, disable the "edit css", "games", and "galaxia" feature and delte tiki-listmovies.php and tiki-special_chars.php.

Share this post


Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Sign in to follow this  

×
×
  • Create New...