ID CVE-2008-5319 Type cve Reporter cve@mitre.org Modified 2017-08-08T01:33:00
Description
Unspecified vulnerability in Tikiwiki before 2.2 has unknown impact and attack vectors related to tiki-error.php, a different issue than CVE-2008-3653.
{"openvas": [{"lastseen": "2019-05-29T18:40:26", "bulletinFamily": "scanner", "description": "The host is installed with Tiki Wiki CMS Groupware and is prone to input sanitation\n weakness vulnerability.", "modified": "2019-03-06T00:00:00", "published": "2008-12-15T00:00:00", "id": "OPENVAS:1361412562310800315", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310800315", "title": "Tiki Wiki CMS Groupware Input Sanitation Weakness Vulnerability", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_tikiwiki_input_sanitation_weak_vuln.nasl 14010 2019-03-06 08:24:33Z cfischer $\n#\n# Tiki Wiki CMS Groupware Input Sanitation Weakness Vulnerability\n#\n# Authors:\n# Sharath S <sharaths@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2008 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:tiki:tikiwiki_cms/groupware\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.800315\");\n script_version(\"$Revision: 14010 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-06 09:24:33 +0100 (Wed, 06 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2008-12-15 15:44:51 +0100 (Mon, 15 Dec 2008)\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:P/A:N\");\n script_cve_id(\"CVE-2008-5318\", \"CVE-2008-5319\");\n script_name(\"Tiki Wiki CMS Groupware Input Sanitation Weakness Vulnerability\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2008 Greenbone Networks GmbH\");\n script_family(\"Web application abuses\");\n script_dependencies(\"secpod_tikiwiki_detect.nasl\");\n script_require_ports(\"Services/www\", 80);\n script_mandatory_keys(\"TikiWiki/installed\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation could allow arbitrary code execution in the context\n of an affected site.\");\n\n script_tag(name:\"affected\", value:\"Tiki Wiki CMS Groupware version prior to 2.2 on all running platform\");\n\n script_tag(name:\"insight\", value:\"The vulnerability is due to input validation error in tiki-error.php\n which fails to sanitise before being returned to the user.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to version 2.2 or later.\");\n\n script_tag(name:\"summary\", value:\"The host is installed with Tiki Wiki CMS Groupware and is prone to input sanitation\n weakness vulnerability.\");\n\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/32341\");\n script_xref(name:\"URL\", value:\"http://info.tikiwiki.org/tiki-read_article.php?articleId=41\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"remote_banner\");\n\n exit(0);\n}\n\ninclude(\"version_func.inc\");\ninclude(\"host_details.inc\");\n\nif( ! port = get_app_port( cpe:CPE ) )\n exit( 0 );\n\nif( ! vers = get_app_version( cpe:CPE, port:port ) )\n exit( 0 );\n\nif( version_is_less( version:vers, test_version:\"2.2\" ) ) {\n report = report_fixed_ver( installed_version:vers, fixed_version:\"2.2\" );\n security_message( port:port, data:report );\n exit( 0 );\n}\n\nexit( 99 );", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}]}