Tiki Wiki CMS Groupware 25.0 Cross Site Request Forgery

2023.01.11
Credit: EgiX
Risk: Low
Local: No
Remote: Yes
CWE: CWE-352

------------------------------------------------------------------------------ Tiki Wiki CMS Groupware <= 25.0 Two Cross-Site Request Forgery Vulnerabilities ------------------------------------------------------------------------------ [-] Software Link: https://tiki.org [-] Affected Versions: Version 25.0 and prior versions. [-] Vulnerabilities Description: 1) The /tiki-importer.php script does not implement any protection against Cross-Site Request Forgery (CSRF) attacks. As such, an attacker might force an authenticated user to import arbitrary content (wiki pages) into TikiWiki by tricking a victim user into browsing to a specially crafted web page. 2) The /tiki-import_sheet.php script does not implement any protection against Cross-Site Request Forgery (CSRF) attacks. As such, an attacker might force an authenticated user to import arbitrary sheets into TikiWiki by tricking a victim user into browsing to a specially crafted web page. Successful exploitation of this vulnerability requires the “Spreadsheets” feature to be enabled. [-] Solution: No official solution is currently available. [-] Disclosure Timeline: [06/03/2022] - Vendor notified [09/01/2023] - Public disclosure [-] CVE Reference: The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2023-22852 to this vulnerability. [-] Credits: Vulnerabilities discovered by Egidio Romano. [-] Original Advisory: http://karmainsecurity.com/KIS-2023-01


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top