First published: Mon Aug 21 2017(Updated: )
DokuWiki through 2017-02-19c has stored XSS when rendering a malicious RSS or Atom feed, in /inc/parser/xhtml.php. An attacker can create or edit a wiki that uses RSS or Atom data from an attacker-controlled server to trigger JavaScript execution. The JavaScript can be in an author field, as demonstrated by the dc:creator element.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dokuwiki Dokuwiki | <=2017-02-19c |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.