FreeBSD : tikiwiki -- multiple vulnerabilities (20a4eb11-8ea3-11dc-a396-0016179b2dd5)

This script is Copyright (C) 2007-2016 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

Secunia reports :

Some vulnerabilities have been reported in TikiWiki, which can be
exploited by malicious people to conduct cross-site scripting and
script insertion attacks and disclose potentially sensitive
information.

Input passed to the username parameter in tiki-remind_password.php
(when remind is set to send me my password) is not properly sanitised
before being returned to the user. This can be exploited to execute
arbitrary HTML and script code (for example with meta refreshes to a
javascript: URL) in a user's browser session in context of an affected
site.

Input passed to the local_php and error_handler parameters in
tiki-index.php is not properly verified before being used to include
files. This can be exploited to include arbitrary files from local
resources.

Input passed to the imp_language parameter in
tiki-imexport_languages.php is not properly verified before being used
to include files. This can be exploited to include arbitrary files
from local resources.

Certain img src elements are not properly santised before being used.
This can be exploited to insert arbitrary HTML and script code, which
is executed in a user's browser session in context of an affected site
when the malicious data is viewed.

See also :

http://www.nessus.org/u?43c520ed
http://www.nessus.org/u?748f5dda

Solution :

Update the affected package.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 27844 (freebsd_pkg_20a4eb118ea311dca3960016179b2dd5.nasl)

Bugtraq ID:

CVE ID: CVE-2007-4554
CVE-2007-5683
CVE-2007-5684

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now