未加星标

Tiki Wiki CMS Groupware 5.2 Multiple Vulnerabiliti

字体大小 | |
[web安全 所属分类 web安全 | 发布者 店小二04 | 时间 20101008 | 作者 路人甲 ] 0人收藏点击收藏
Source: http://www.securityfocus.com/bid/43507/info
Tiki Wiki CMS Groupware is prone to a local file-include vulnerability and a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
An attacker can exploit the local file-include vulnerability using directory-traversal strings to view and execute local files within the context of the webserver process. Information harvested may aid in further attacks.
The attacker may leverage the cross-site scripting issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks.
The following applications are vulnerable; other versions may also be affected.
1. Tiki Wiki CMS Groupware 5.2 is vulnerable
2. Tiki Wiki CMS Groupware prior to 3.8
The following example URIs are available:
Local file Include:
jsplugin.php?plugin=x&language=../../../../../../../../../../windows/win.ini">http://www.example.com/tiki-5.2/tiki-jsplugin.php?plugin=x&language=../../../../../../../../../../windows/win.ini
Cross Site Scripting:
http://www.example.com/tiki-5.2/tiki-edit_wiki_section.php?type=%22%3E%3Cscript%3Ealert(0)%3C/script%3E

本文web安全相关术语:黑盒测试方法 黑盒测试和白盒测试 网站安全检测 360网站安全检测 网络安全知识 网络安全技术 网络信息安全 网络安全工程师

tags: #160,tiki,may,Tiki,CMS,Wiki,Groupware,site,vulnerability,example,The
分页:12
转载请注明
本文标题:Tiki Wiki CMS Groupware 5.2 Multiple Vulnerabiliti
本站链接:https://www.codesec.net/view/7064.html


1.凡CodeSecTeam转载的文章,均出自其它媒体或其他官网介绍,目的在于传递更多的信息,并不代表本站赞同其观点和其真实性负责;
2.转载的文章仅代表原创作者观点,与本站无关。其原创性以及文中陈述文字和内容未经本站证实,本站对该文以及其中全部或者部分内容、文字的真实性、完整性、及时性,不作出任何保证或承若;
3.如本站转载稿涉及版权等问题,请作者及时联系本站,我们会及时处理。
登录后可拥有收藏文章、关注作者等权限...
技术大类 技术大类 | web安全 | 评论(0) | 阅读(11)