Lucene search

K
gentooGentoo FoundationGLSA-200606-29
HistoryJun 29, 2006 - 12:00 a.m.

Tikiwiki: SQL injection and multiple XSS vulnerabilities

2006-06-2900:00:00
Gentoo Foundation
security.gentoo.org
9

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.008 Low

EPSS

Percentile

81.4%

Background

Tikiwiki is a web-based groupware and content management system (CMS), using PHP, ADOdb and Smarty.

Description

Tikiwiki fails to properly sanitize user input before processing it, including in SQL statements.

Impact

An attacker could execute arbitrary SQL statements on the underlying database, or inject arbitrary scripts into the context of a user’s browser.

Workaround

There is no known workaround at this time.

Resolution

All Tikiwiki users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=www-apps/tikiwiki-1.9.4"
OSVersionArchitecturePackageVersionFilename
Gentooanyallwww-apps/tikiwiki< 1.9.4UNKNOWN

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.008 Low

EPSS

Percentile

81.4%