First published: Mon Aug 21 2017(Updated: )
DokuWiki through 2017-02-19c has stored XSS when rendering a malicious language name in a code element, in /inc/parser/xhtml.php. An attacker can create or edit a wiki with this element to trigger JavaScript execution.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
DokuWiki | <=2017-02-19c |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-12979 is considered a high severity vulnerability due to its potential for stored cross-site scripting (XSS).
To fix CVE-2017-12979, update DokuWiki to a version later than 2017-02-19c where this vulnerability is patched.
CVE-2017-12979 allows attackers to execute arbitrary JavaScript in the context of a user's browser, potentially leading to data theft or session hijacking.
Any DokuWiki installation version up to and including 2017-02-19c is vulnerable to CVE-2017-12979.
CVE-2017-12979 exploits stored XSS via malicious language names rendered in code elements, allowing attackers to inject and execute JavaScript.