CVE-2004-1924
CVSS4.3
发布时间 :2004-04-11 00:00:00
修订时间 :2016-10-17 23:03:05
NMCOE    

[原文]Multiple cross-site scripting (XSS) vulnerabilities in Tiki CMS/Groupware (TikiWiki) 1.8.1 and earlier allow remote attackers to inject arbitrary web script or HTML via via the (1) theme parameter to tiki-switch_theme.php, (2) find and priority parameters to messu-mailbox.php, (3) flag, priority, flagval, sort_mode, or find parameters to messu-read.php, (4) articleId parameter to tiki-read_article.php, (5) parentId parameter to tiki-browse_categories.php, (6) comments_threshold parameter to tiki-index.php (7) articleId parameter to tiki-print_article.php, (8) galleryId parameter to tiki-list_file_gallery.php, (9) galleryId parameter to tiki-upload_file.php, (10) faqId parameter to tiki-view_faq.php, (11) chartId parameter to tiki-view_chart.php, or (12) surveyId parameter to tiki-survey_stats_survey.php.


[CNNVD]TikiWiki项目多个输入验证漏洞(CNNVD-200404-013)

        Tiki CMS/Groupware (TikiWiki) 1.8.1及其早期版本存在多个跨站脚本(XSS)漏洞。远程攻击者可以通过(1)tiki-switch_theme.php的theme参数(2)messu - mailbox.php的find和priority参数,(3)messu - read.php的flag, priority, flagval, sort_mode或者find参数,(4) tiki-read_article.php的articleId参数,(5)tiki-browse_categories.php的parentId参数,(6)tiki-index.php的comments_threshold参数(7)tiki-print_article.php的articleId参数,(8)tiki-list_file_gallery.php的galleryId参数,(9)tiki-upload_file.php的galleryId参数,(10)tiki-view_faq.php的faqId参数,(11)tiki-view_chart.php的chartId参数,或(12)tiki-survey_stats_survey.php的surveyId参数注入任意的web脚本或者HTML。

- CVSS (基础分值)

CVSS分值: 4.3 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CWE (弱点类目)

CWE-79 [在Web页面生成时对输入的转义处理不恰当(跨站脚本)]

- CPE (受影响的平台与产品)

cpe:/a:tiki:tikiwiki_cms%2fgroupware:1.6.1Tiki Tikiwiki CMS/Groupware 1.6.1
cpe:/a:tiki:tikiwiki_cms%2fgroupware:1.8.1Tiki Tikiwiki CMS/Groupware 1.8.1 (Polaris)

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1924
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-1924
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200404-013
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=108180073206947&w=2
(UNKNOWN)  BUGTRAQ  20040412 Multiple Vulnerabilities In Tiki CMS/Groupware [ TikiWiki ]
http://tikiwiki.org/tiki-read_article.php?articleId=66
(PATCH)  CONFIRM  http://tikiwiki.org/tiki-read_article.php?articleId=66
http://www.securityfocus.com/bid/10100
(VENDOR_ADVISORY)  BID  10100
http://xforce.iss.net/xforce/xfdb/15846
(VENDOR_ADVISORY)  XF  tikiwiki-xss(15846)

- 漏洞信息

TikiWiki项目多个输入验证漏洞
中危 跨站脚本
2004-04-11 00:00:00 2005-10-20 00:00:00
远程  
        Tiki CMS/Groupware (TikiWiki) 1.8.1及其早期版本存在多个跨站脚本(XSS)漏洞。远程攻击者可以通过(1)tiki-switch_theme.php的theme参数(2)messu - mailbox.php的find和priority参数,(3)messu - read.php的flag, priority, flagval, sort_mode或者find参数,(4) tiki-read_article.php的articleId参数,(5)tiki-browse_categories.php的parentId参数,(6)tiki-index.php的comments_threshold参数(7)tiki-print_article.php的articleId参数,(8)tiki-list_file_gallery.php的galleryId参数,(9)tiki-upload_file.php的galleryId参数,(10)tiki-view_faq.php的faqId参数,(11)tiki-view_chart.php的chartId参数,或(12)tiki-survey_stats_survey.php的surveyId参数注入任意的web脚本或者HTML。

- 公告与补丁

        The vendor has released TikiWiki 1.8.2 to address these issues:
        TikiWiki Project TikiWiki 1.8
        
        TikiWiki Project TikiWiki 1.8.1
        

- 漏洞信息 (23947)

TikiWiki Project 1.8 tiki-switch_theme.php theme Parameter XSS (EDBID:23947)
php webapps
2004-04-12 Verified
0 JeiAr
N/A [点击下载]
source: http://www.securityfocus.com/bid/10100/info

Multiple vulnerabilities have been identified in various modules of the application. These vulnerabilities may allow a remote attacker to carry out various attacks such as path disclosure, cross-site scripting, HTML injection, SQL injection, directory traversal, and arbitrary file upload.

tiki-switch_theme.php?theme=[XSS]		

- 漏洞信息 (23953)

TikiWiki Project 1.8 messu-mailbox.php Multiple Parameter XSS (EDBID:23953)
php webapps
2004-04-12 Verified
0 JeiAr
N/A [点击下载]
source: http://www.securityfocus.com/bid/10100/info
     
Multiple vulnerabilities have been identified in various modules of the application. These vulnerabilities may allow a remote attacker to carry out various attacks such as path disclosure, cross-site scripting, HTML injection, SQL injection, directory traversal, and arbitrary file upload.

messu-mailbox.php?flags=&priority=&find=[XSS]
messu-mailbox.php?flags=&priority=[XSS]		

- 漏洞信息 (23954)

TikiWiki Project 1.8 messu-read.php Multiple Parameter XSS (EDBID:23954)
php webapps
2004-04-12 Verified
0 JeiAr
N/A [点击下载]
source: http://www.securityfocus.com/bid/10100/info
      
Multiple vulnerabilities have been identified in various modules of the application. These vulnerabilities may allow a remote attacker to carry out various attacks such as path disclosure, cross-site scripting, HTML injection, SQL injection, directory traversal, and arbitrary file upload.

messu-read.php?offset=[INT]&flag=&priority=&flagval=&sort_mode=date_desc&find=[XSS]
messu-read.php?offset=[INT]&flag=&priority=&flagval=&sort_mode=[XSS]
messu-read.php?offset=[INT]&flag=&priority=&flagval=[XSS]
messu-read.php?offset=[INT]&flag=&priority=[XSS]
messu-read.php?offset=[INT]&flag=[XSS]
messu-read.php?offset=[XSS]		

- 漏洞信息 (23955)

TikiWiki Project 1.8 tiki-read_article.php articleId Parameter XSS (EDBID:23955)
php webapps
2004-04-12 Verified
0 JeiAr
N/A [点击下载]
source: http://www.securityfocus.com/bid/10100/info
       
Multiple vulnerabilities have been identified in various modules of the application. These vulnerabilities may allow a remote attacker to carry out various attacks such as path disclosure, cross-site scripting, HTML injection, SQL injection, directory traversal, and arbitrary file upload.

tiki-read_article.php?articleId=[VID][XSS]		

- 漏洞信息 (23956)

TikiWiki Project 1.8 tiki-browse_categories.php parentId Parameter XSS (EDBID:23956)
php webapps
2004-04-12 Verified
0 JeiAr
N/A [点击下载]
source: http://www.securityfocus.com/bid/10100/info
        
Multiple vulnerabilities have been identified in various modules of the application. These vulnerabilities may allow a remote attacker to carry out various attacks such as path disclosure, cross-site scripting, HTML injection, SQL injection, directory traversal, and arbitrary file upload.

tiki-browse_categories.php?find=&deep=off&parentId=[VID][XSS]		

- 漏洞信息 (23957)

TikiWiki Project 1.8 tiki-index.php comments_threshold Parameter XSS (EDBID:23957)
php webapps
2004-04-12 Verified
0 JeiAr
N/A [点击下载]
source: http://www.securityfocus.com/bid/10100/info
         
Multiple vulnerabilities have been identified in various modules of the application. These vulnerabilities may allow a remote attacker to carry out various attacks such as path disclosure, cross-site scripting, HTML injection, SQL injection, directory traversal, and arbitrary file upload.

tiki-index.php?page=[VPG]&comments_threshold=[INT][XSS]		

- 漏洞信息 (23958)

TikiWiki Project 1.8 tiki-print_article.php articleId Parameter XSS (EDBID:23958)
php webapps
2004-04-12 Verified
0 JeiAr
N/A [点击下载]
source: http://www.securityfocus.com/bid/10100/info
         
Multiple vulnerabilities have been identified in various modules of the application. These vulnerabilities may allow a remote attacker to carry out various attacks such as path disclosure, cross-site scripting, HTML injection, SQL injection, directory traversal, and arbitrary file upload.

tiki-print_article.php?articleId=[VID][XSS]		

- 漏洞信息 (23959)

TikiWiki Project 1.8 tiki-list_file_gallery.php galleryId Parameter XSS (EDBID:23959)
php webapps
2004-04-12 Verified
0 JeiAr
N/A [点击下载]
source: http://www.securityfocus.com/bid/10100/info
         
Multiple vulnerabilities have been identified in various modules of the application. These vulnerabilities may allow a remote attacker to carry out various attacks such as path disclosure, cross-site scripting, HTML injection, SQL injection, directory traversal, and arbitrary file upload.

tiki-list_file_gallery.php?galleryId=[VID][XSS]		

- 漏洞信息 (23960)

TikiWiki Project 1.8 tiki-upload_file.php galleryId Parameter XSS (EDBID:23960)
php webapps
2004-04-12 Verified
0 JeiAr
N/A [点击下载]
source: http://www.securityfocus.com/bid/10100/info
          
Multiple vulnerabilities have been identified in various modules of the application. These vulnerabilities may allow a remote attacker to carry out various attacks such as path disclosure, cross-site scripting, HTML injection, SQL injection, directory traversal, and arbitrary file upload.

tiki-upload_file.php?galleryId=[VID][XSS]		

- 漏洞信息 (23961)

TikiWiki Project 1.8 tiki-view_faq.php faqId Parameter XSS (EDBID:23961)
php webapps
2004-04-12 Verified
0 JeiAr
N/A [点击下载]
source: http://www.securityfocus.com/bid/10100/info
          
Multiple vulnerabilities have been identified in various modules of the application. These vulnerabilities may allow a remote attacker to carry out various attacks such as path disclosure, cross-site scripting, HTML injection, SQL injection, directory traversal, and arbitrary file upload.

tiki-view_faq.php?faqId=[VID][XSS]		

- 漏洞信息 (23962)

TikiWiki Project 1.8 tiki-view_chart.php chartId Parameter XSS (EDBID:23962)
php webapps
2004-04-12 Verified
0 JeiAr
N/A [点击下载]
source: http://www.securityfocus.com/bid/10100/info
           
Multiple vulnerabilities have been identified in various modules of the application. These vulnerabilities may allow a remote attacker to carry out various attacks such as path disclosure, cross-site scripting, HTML injection, SQL injection, directory traversal, and arbitrary file upload.

tiki-view_chart.php?chartId=[VID][XSS]		

- 漏洞信息

5181
TikiWiki tiki-switch_theme.php theme Parameter XSS
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Public Vendor Verified

- 漏洞描述

TikiWiki contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the "theme" variable upon submission to the "tiki-switch_theme.php" script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

- 时间线

2004-04-11 Unknow
2004-04-11 Unknow

- 解决方案

Upgrade to version 1.8.2 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站