Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 185886 - www-apps/dokuwiki < 2007-06-26b XSS in spellchecker
Summary: www-apps/dokuwiki < 2007-06-26b XSS in spellchecker
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High minor (vote)
Assignee: Gentoo Security
URL: http://bugs.splitbrain.org/index.php?...
Whiteboard: B4 [noglsa] p-y
Keywords:
Depends on:
Blocks:
 
Reported: 2007-07-19 17:39 UTC by Philippe Chaintreuil
Modified: 2007-07-23 14:57 UTC (History)
3 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Philippe Chaintreuil 2007-07-19 17:39:32 UTC
From http://bugs.splitbrain.org/index.php?do=details&task_id=1195

-----------------------------------------------------------------------------
Compass Security discovered an XSS vulnerability in DokuWiki's spellchecker backend.

The spellchecker tests the UTF-8 capabilities of the used browser by sending an UTF-8 string to the backend, which will send it back unfiltered. By comparing string length the spellchecker can work around broken implementations. An attacker could construct a form to let users send JavaScript to the spellchecker backend, resulting in malicious JavaScript being executed in their browser.

Affected are all versions up to and including 2007-06-26 even when the spell checker is disabled.

The vulnerability is only exploitable with Microsoft Internet Explorer (because of its broken MIME handling) other browsers will not execute the JavaScript sent back.

A new updated release 2007-06-26b was made available at http://www.splitbrain.org/go/dokuwiki

You may fix the problem yourself by replacing the spell_utf8test() function in lib/exe/spellcheck.php with the following code:

function spell_utf8test(){
print substr($_POST['data'],0,3);
}

If you fix it yourself you should increase the number in conf/msg to 10 for disabling update notification for this issue.
-----------------------------------------------------------------------------

Reproducible: Always




- We need a new ebuild for 2007-06-26b
- 2007-06-26 and before should probably be masked for security reasons.
Comment 1 Pierre-Yves Rofes (RETIRED) gentoo-dev 2007-07-21 09:54:27 UTC
Thanks for the report Philippe.
setting status and cc'ing maintainer, please bump as necessary.
Comment 2 Andrej Kacian (RETIRED) gentoo-dev 2007-07-22 20:32:44 UTC
Sorry guys, I was unexpectedly offline for the weekend. 20070626b is in CVS now, along with a small ebuild fix.
Comment 3 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2007-07-22 20:52:43 UTC
x86 please test and mark dokuwiki-20070626b.ebuild stable. 
Comment 4 Andrej Kacian (RETIRED) gentoo-dev 2007-07-23 09:01:35 UTC
Tested on several different app configs, works fine. Stable on x86.
Comment 5 Pierre-Yves Rofes (RETIRED) gentoo-dev 2007-07-23 09:05:39 UTC
Thanks ticho.
Time for GLSA decision. According to the URL, the only vulnerable browser is MSIE, so voting NO.
Comment 6 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2007-07-23 14:57:11 UTC
Voting NO and closing.