Lucene search

K
gentooGentoo FoundationGLSA-200704-08
HistoryApr 12, 2007 - 12:00 a.m.

DokuWiki: Cross-site scripting vulnerability

2007-04-1200:00:00
Gentoo Foundation
security.gentoo.org
10

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.008 Low

EPSS

Percentile

82.0%

Background

DokuWiki is a simple to use wiki aimed at creating documentation.

Description

DokuWiki does not sanitize user input to the GET variable ‘media’ in the fetch.php file.

Impact

An attacker could entice a user to click a specially crafted link and inject CRLF characters into the variable. This would allow the creation of new lines or fields in the returned HTTP Response header, which would permit the attacker to execute arbitrary scripts in the context of the user’s browser.

Workaround

Replace the following line in lib/exe/fetch.php:

$MEDIA = getID('media',false); // no cleaning - maybe external

with

$MEDIA = preg_replace('/[\x00-\x1F]+/s','',getID('media',false));

Resolution

All DokuWiki users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=www-apps/dokuwiki-20061106"
OSVersionArchitecturePackageVersionFilename
Gentooanyallwww-apps/dokuwiki< 20061106UNKNOWN

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.008 Low

EPSS

Percentile

82.0%