First published: Sun Apr 22 2012(Updated: )
A cross-site scripting (XSS) and cross-site request forgery (CSRF) flaws were found in the way DokuWiki, a standards compliant, simple to use Wiki, performed sanitization of the 'target' parameter when preprocessing edit form data. A remote attacker could provide a specially-crafted URL, which once visited by a valid DokuWiki user would lead to arbitrary HTML or web script execution in the context of logged in DokuWiki user. References: [1] <a href="https://secunia.com/advisories/48848/">https://secunia.com/advisories/48848/</a> [2] <a href="http://ircrash.com/uploads/dokuwiki.txt">http://ircrash.com/uploads/dokuwiki.txt</a> [3] <a href="https://bugs.gentoo.org/show_bug.cgi?id=412891">https://bugs.gentoo.org/show_bug.cgi?id=412891</a> Discovered by : Khashayar Fereidani Proof of Concept URL: <a href="http://sitename/doku.php?do=edit&id=S9F8W2A&target">http://sitename/doku.php?do=edit&id=S9F8W2A&target</a>=<script>alert(123)</script>
Affected Software | Affected Version | How to fix |
---|---|---|
DokuWiki |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-815122 is categorized as high due to the potential for exploitation by remote attackers.
To fix REDHAT-BUG-815122, it is recommended to update DokuWiki to the latest version that addresses these vulnerabilities.
The risks associated with REDHAT-BUG-815122 include potential unauthorized access and data manipulation through XSS and CSRF attacks.
Users of DokuWiki, particularly those who utilize the edit form feature, are affected by REDHAT-BUG-815122.
REDHAT-BUG-815122 presents cross-site scripting (XSS) and cross-site request forgery (CSRF) vulnerabilities.