First published: Mon Aug 21 2017(Updated: )
DokuWiki through 2017-02-19c has stored XSS when rendering a malicious RSS or Atom feed, in /inc/parser/xhtml.php. An attacker can create or edit a wiki that uses RSS or Atom data from an attacker-controlled server to trigger JavaScript execution. The JavaScript can be in an author field, as demonstrated by the dc:creator element.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
DokuWiki | <=2017-02-19c |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-12980 is classified as a moderate severity vulnerability due to its potential for stored XSS attacks.
To fix CVE-2017-12980, update DokuWiki to a version later than 2017-02-19c.
CVE-2017-12980 allows attackers to execute JavaScript in the context of an unsuspecting user's session, potentially leading to data theft or session hijacking.
Yes, CVE-2017-12980 can be exploited remotely through malicious RSS or Atom feeds.
If updating is not an option, consider disabling the RSS and Atom feed features to mitigate CVE-2017-12980.