Vulnerability CVE-2014-9253


Published: 2014-12-17

Description:
The default file type whitelist configuration in conf/mime.conf in the Media Manager in DokuWiki before 2014-09-29b allows remote attackers to execute arbitrary web script or HTML by uploading an SWF file, then accessing it via the media parameter to lib/exe/fetch.php.

CVSS2 => (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Mageia -> Mageia 
Dokuwiki -> Dokuwiki 

 References:
http://advisories.mageia.org/MGASA-2014-0540.html
http://seclists.org/oss-sec/2014/q4/1050
http://security.szurek.pl/dokuwiki-20140929a-xss.html
http://www.securityfocus.com/bid/71671
http://www.securitytracker.com/id/1031369
https://exchange.xforce.ibmcloud.com/vulnerabilities/99291
https://github.com/splitbrain/dokuwiki/commit/778ddf6f2cd9ed38b9db2d73e823b8c21243a960
https://www.dokuwiki.org/changes

Copyright 2024, cxsecurity.com

 

Back to Top