lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <GKEOJIPDJOHGOEEOIINIAEFFCAAA.advisory@stgsecurity.com> From: advisory at stgsecurity.com (SSR Team) Subject: STG Security Advisory: [SSA-20041022-08] MoniWiki XSS vulnerability -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 STG Security Advisory: [SSA-20041022-08] MoniWiki XSS vulnerability Revision 1.0 Date Published: 2004-10-22 (KST) Last Update: 2004-10-22 Disclosed by SSR Team (advisory@...security.com) Summary ======== MoniWiki is a wiki web application used by many Korean Linux users. It has a cross site scripting vulnerability. Vulnerability Class =================== Implementation Error: Input validation flaw Details ======= Due to an input validation flaw, the MoniWiki is vulnerable to cross site scripting attacks. http://[victim]/wiki.php/<script>alert("XSS Vulnerability exists")</script> Impact ====== Medium: Malicious attackers can inject and execute arbitrary script code in a user's browser session in context of an affected site. Solution ========= Update to MoniWiki 1.0.9 Affected Products ================ MoniWiki 1.0.8 and prior Vendor Status: FIXED ======================= 2004-09-30 Vulnerability found. 2004-09-30 MoniWiki developer notified. 2004-10-21 MoniWiki 1.0.9 released. 2004-10-22 Official release. Credits ====== Jeremy Bae at STG Security -----BEGIN PGP SIGNATURE----- Version: PGP 8.0 iQA/AwUBQXxefj9dVHd/hpsuEQLNNwCgnNhdf+5DXwhtrr4FpAl1Tvij2s0AoJT6 YFdZvyM83JtcuhyElHRR+Eii =Sf9j -----END PGP SIGNATURE-----
Powered by blists - more mailing lists