Summary: | www-apps/tikiwiki: <1.9.3.2 multiple XSS (CVE-2006-2635) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Raphael Marichez (Falco) (RETIRED) <falco> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | stepp, web-apps |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://archives.neohapsis.com/archives/bugtraq/2006-05/0565.html | ||
Whiteboard: | B4 [glsa] Falco | ||
Package list: | Runtime testing required: | --- |
Description
Raphael Marichez (Falco) (RETIRED)
![]() Hi, Hrm ... none of those links work at all :( I'll have to get tikiwiki setup locally to try and reproduce this problem. I'll also have a poke around UPSTREAM's cvs repos to see if they've added any unreleased fixes. Best regards, Stu Thanks Stuart; assigning to "Auditing" then, in order to know if we are vulnerable or not. *** Bug 136108 has been marked as a duplicate of this bug. *** Handling the tikiwiki issue on this bug. 1.9.3.2 is out now. adding CVE ref in CVS ppc please test and mark stable. ppc stable. old vulnerable ebuild removed. I tend to vote NO. We had already issue GLSA 200510-23 concerning a TikiWiki XSS. Should we follow the history or change it ? I usually tend to vote yes for XSS in wikis... but only if you can actually post things with active code in it, not just follow lame links. So I vote NO. In my understanding you can inject arbitrary JavaScript. If that is true I vote YES. Voting No and closing. Feel free to reopen if you disagree. Furthermore, another security update (1.9.3.4) has just been issued, see bug 136723, which is probably a little bit more serious (SQL injection and XSS). Reopening to be included with bug #136723. GLSA 200606-29 |