Cross-site scripting in DokuWiki - CVE-2012-0283
Published: July 14, 2012 / Updated: August 11, 2020
DokuWiki
Detailed vulnerability description
Vulnerability allows a remote attacker to perform Cross-site scripting attacks.
An input validation error exists in the tpl_mediaFileList function in inc/template.php in DokuWiki before 2012-01-25b when processing ns parameter in a medialist action to lib/exe/ajax.php. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
How to mitigate CVE-2012-0283
Sources
- http://bugs.dokuwiki.org/index.php?do=details&task_id=2561
- http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090755.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090899.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090938.html
- http://secunia.com/secunia_research/2012-24/
- http://security.gentoo.org/glsa/glsa-201301-07.xml
- http://www.securityfocus.com/bid/54439