Tiki CMS/Groupware (TikiWiki) 1.8.1及其早期版本存在多个跨站脚本(XSS)漏洞。远程攻击者可以通过(1)tiki-switch_theme.php的theme参数(2)messu - mailbox.php的find和priority参数,(3)messu - read.php的flag, priority, flagval, sort_mode或者find参数,(4) tiki-read_article.php的articleId参数,(5)tiki-browse_categories.php的parentId参数,(6)tiki-index.php的comments_threshold参数(7)tiki-print_article.php的articleId参数,(8)tiki-list_file_gallery.php的galleryId参数,(9)tiki-upload_file.php的galleryId参数,(10)tiki-view_faq.php的faqId参数,(11)tiki-view_chart.php的chartId参数,或(12)tiki-survey_stats_survey.php的surveyId参数注入任意的web脚本或者HTML。
Tiki CMS/Groupware (TikiWiki) 1.8.1及其早期版本存在多个跨站脚本(XSS)漏洞。远程攻击者可以通过(1)tiki-switch_theme.php的theme参数(2)messu - mailbox.php的find和priority参数,(3)messu - read.php的flag, priority, flagval, sort_mode或者find参数,(4) tiki-read_article.php的articleId参数,(5)tiki-browse_categories.php的parentId参数,(6)tiki-index.php的comments_threshold参数(7)tiki-print_article.php的articleId参数,(8)tiki-list_file_gallery.php的galleryId参数,(9)tiki-upload_file.php的galleryId参数,(10)tiki-view_faq.php的faqId参数,(11)tiki-view_chart.php的chartId参数,或(12)tiki-survey_stats_survey.php的surveyId参数注入任意的web脚本或者HTML。