Tiki Wiki CMS Groupware <= 7.2 'snarf_ajax.php' Cross Site Scripting Vulnerability
2011-07-20T00:00:00
ID EDB-ID:35974 Type exploitdb Reporter High-Tech Bridge SA Modified 2011-07-20T00:00:00
Description
Tiki Wiki CMS Groupware 7.2 'snarf_ajax.php' Cross Site Scripting Vulnerability. CVE-2011-4336. Webapps exploit for php platform
source: http://www.securityfocus.com/bid/48806/info
Tiki Wiki CMS Groupware is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied data.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
Tiki Wiki CMS Groupware 7.0 is vulnerable; other versions may also be affected.
http://www.example.com/snarf_ajax.php?url=1&ajax=%3Cscript%3Ealert%28document.cookie%29;%3C/script%3E
{"id": "EDB-ID:35974", "hash": "118c4b602b485e04f5415dd3513c4c9f", "type": "exploitdb", "bulletinFamily": "exploit", "title": "Tiki Wiki CMS Groupware <= 7.2 'snarf_ajax.php' Cross Site Scripting Vulnerability", "description": "Tiki Wiki CMS Groupware 7.2 'snarf_ajax.php' Cross Site Scripting Vulnerability. CVE-2011-4336. Webapps exploit for php platform", "published": "2011-07-20T00:00:00", "modified": "2011-07-20T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://www.exploit-db.com/exploits/35974/", "reporter": "High-Tech Bridge SA", "references": [], "cvelist": ["CVE-2011-4336"], "lastseen": "2016-02-04T02:24:57", "history": [], "viewCount": 0, "enchantments": {"score": {"value": -0.1, "vector": "NONE", "modified": "2016-02-04T02:24:57"}, "dependencies": {"references": [{"type": "htbridge", "idList": ["HTB23027"]}], "modified": "2016-02-04T02:24:57"}, "vulnersScore": -0.1}, "objectVersion": "1.4", "sourceHref": "https://www.exploit-db.com/download/35974/", "sourceData": "source: http://www.securityfocus.com/bid/48806/info\r\n\r\nTiki Wiki CMS Groupware is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied data.\r\n\r\nAn attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.\r\n\r\nTiki Wiki CMS Groupware 7.0 is vulnerable; other versions may also be affected. \r\n\r\nhttp://www.example.com/snarf_ajax.php?url=1&ajax=%3Cscript%3Ealert%28document.cookie%29;%3C/script%3E", "osvdbidlist": ["74039"], "_object_type": "robots.models.exploitdb.ExploitDbBulletin", "_object_types": ["robots.models.exploitdb.ExploitDbBulletin", "robots.models.base.Bulletin"]}
{"htbridge": [{"lastseen": "2017-06-23T23:08:33", "bulletinFamily": "software", "description": "High-Tech Bridge SA Security Research Lab has discovered vulnerability in Tiki Wiki CMS Groupware, which can be exploited to perform cross-site scripting attacks. \n \n1) Cross-site scripting (XSS) vulnerability in Tiki Wiki CMS Groupware \nInput passed via the GET \"ajax\" parameter to snarf_ajax.php is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser in context of an affected website. Successful exploitation requires that victim is logged-in into the application and has access to administrative interface. \nExploitation example: \nhttp://[host]/snarf_ajax.php?url=1&ajax=%3Cscript%3Ealert%28document.cookie% 29;%3C/script%3E\n", "modified": "2011-11-22T00:00:00", "published": "2011-06-29T00:00:00", "id": "HTB23027", "href": "https://www.htbridge.com/advisory/HTB23027", "type": "htbridge", "title": "Cross-site Scripting (XSS) Vulnerability in Tiki Wiki CMS Groupware", "cvss": {"score": 2.6, "vector": "AV:N/AC:H/Au:N/C:N/I:P/A:N/"}}]}