![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.803008 |
Categoría: | Web application abuses |
Título: | DokuWiki 'target' Parameter Cross Site Scripting Vulnerability |
Resumen: | DokuWiki is prone to a cross-site scripting (XSS) vulnerability. |
Descripción: | Summary: DokuWiki is prone to a cross-site scripting (XSS) vulnerability. Vulnerability Insight: The input passed via 'target' parameter to 'doku.php' script (when 'do' is set to 'edit') is not properly validated, which allows attackers to execute arbitrary HTML and script code in a user's browser session in the context of an affected site. Vulnerability Impact: Successful exploitation will allow remote attackers to insert arbitrary HTML and script code, which will be executed in a user's browser session in the context of an affected site. Affected Software/OS: DokuWiki version 2012-01-25 and prior Solution: Upgrade to DokuWiki version 2012-01-25a or later. CVSS Score: 4.3 CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2012-2129 20120417 DokuWiki Ver.2012/01/25 CSRF Add User Exploit http://seclists.org/bugtraq/2012/Apr/121 48848 http://secunia.com/advisories/48848 53041 http://www.securityfocus.com/bid/53041 [oss-security] 20120422 CVE Request -- DokuWiki: XSS and CSRF due improper escaping of 'target' parameter in preprocessing edit form data http://www.openwall.com/lists/oss-security/2012/04/22/4 [oss-security] 20120422 Re: CVE Request -- DokuWiki: XSS and CSRF due improper escaping of 'target' parameter in preprocessing edit form data http://www.openwall.com/lists/oss-security/2012/04/23/1 dokuwiki-doku-xss(74907) https://exchange.xforce.ibmcloud.com/vulnerabilities/74907 http://bugs.dokuwiki.org/index.php?do=details&task_id=2487 http://ircrash.com/uploads/dokuwiki.txt https://bugs.gentoo.org/show_bug.cgi?id=412891 https://bugzilla.redhat.com/show_bug.cgi?id=815122 https://github.com/splitbrain/dokuwiki/commit/ff71173477e54774b5571015d49d944f51cb8a26 |
Copyright | Copyright (C) 2012 Greenbone AG |
Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |