[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2014-9253Date: (C)2014-12-22   (M)2023-12-22


The default file type whitelist configuration in conf/mime.conf in the Media Manager in DokuWiki before 2014-09-29b allows remote attackers to execute arbitrary web script or HTML by uploading an SWF file, then accessing it via the media parameter to lib/exe/fetch.php.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 4.3
Exploit Score: 8.6
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: MEDIUM
Authentication: NONE
Confidentiality: NONE
Integrity: PARTIAL
Availability: NONE
  
Reference:
SECTRACK-1031369
BID-71671
http://seclists.org/oss-sec/2014/q4/1050
dokuwiki-cve20149253-xss(99291)
http://advisories.mageia.org/MGASA-2014-0540.html
http://security.szurek.pl/dokuwiki-20140929a-xss.html
https://github.com/splitbrain/dokuwiki/commit/778ddf6f2cd9ed38b9db2d73e823b8c21243a960
https://www.dokuwiki.org/changes

CPE    1
cpe:/a:dokuwiki:dokuwiki
CWE    1
CWE-79
OVAL    2
oval:org.secpod.oval:def:108559
oval:org.secpod.oval:def:108552

© SecPod Technologies