Cross-site scripting (XSS) vulnerability in the tpl_mediaFileList function
in inc/template.php in DokuWiki before 2012-01-25b allows remote attackers
to inject arbitrary web script or HTML via the ns parameter in a medialist
action to lib/exe/ajax.php.
*** Bug 433109 has been marked as a duplicate of this bug. ***
Simple version bump to the ebuild to www-apps/dokuwiki-20090214b (ie, just rename www-apps/dokuwiki-20090214a) works for me.
FWIW I just bumped dokuwiki to 20121013. Feel free to mark stable after tests have checked it out.
(In reply to comment #3)
> FWIW I just bumped dokuwiki to 20121013. Feel free to mark stable after
> tests have checked it out.
Arches, please test and mark stable.
Thanks, folks. Closing noglsa for XSS.
(In reply to comment #7)
> Thanks, folks. Closing noglsa for XSS.
Actually we can include this in the existing draft.
This issue was resolved and addressed in
GLSA 201301-07 at http://security.gentoo.org/glsa/glsa-201301-07.xml
by GLSA coordinator Stefan Behte (craig).