Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <f4f9c27d-aac3-0310-77f4-0013df738242@chbi.eu>
Date: Thu, 2 Aug 2018 19:45:38 +0200
From: chbi@...i.eu
To: oss-security@...ts.openwall.com
Subject: Stored XSS vulnerabilities in Tiki <= 18.1

Hi,

I've discovered four security issues in Tiki <= 18.1 (https://tiki.org)


Four stored XSS vulnerabilities allow an authenticated user injecting
JavaScript to gain administrator privileges if an administrator opens a
wiki page and moves the mouse pointer over a modified link or thumb image.


The issues are fixed in Tiki 18.2 and the fixes are backported to 12.14
and 15.7.

Fixes:
https://sourceforge.net/p/tikiwiki/code/66809
https://sourceforge.net/p/tikiwiki/code/66990


Timeline:
2018-06-15: Issues discovered and reported
2018-06-25: 3 of 4 issues fixed
2018-07-12: All 4 issues confirmed
2018-07-20: 4 of 4 issues fixed
2018-07-31: Tiki 18.2, 15.7 and 12.14 released


I've requested a CVE ID (MITRE).

-- 
chbi
https://chbi.eu

GPG: 3DE9 9187 4BE9 EAE6 3CA8  DC20 BA7B 93F9 9037 AE7E
     https://chbi.eu/chbi.asc



Download attachment "signature.asc" of type "application/pgp-signature" (834 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.