TikiWiki User Profile Multiple Option Code Injection

2004-04-11T14:03:29
ID OSVDB:5184
Type osvdb
Reporter JeiAr(jeiar@gulftech.org)
Modified 2004-04-11T14:03:29

Description

Vulnerability Description

TikiWiki contains a flaw that allows remote code injection. This flaw exists because the application does not validate User Profile variables upon submission to the application. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Upgrade to version 1.8.2 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

TikiWiki contains a flaw that allows remote code injection. This flaw exists because the application does not validate User Profile variables upon submission to the application. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Manual Testing Notes

Navigate to the following options, input arbitrary code: User Profile > Theme User Profile > Country Field User Profile > Real Name User Profile > Displayed time zone

References:

Vendor URL: http://www.tikiwiki.org/ Vendor URL: http://freshmeat.net/projects/tiki/ Vendor Specific Advisory URL Secunia Advisory ID:11344 Secunia Advisory ID:13772 Other Advisory URL: http://www.gulftech.org/04112004.php