180
TikiWiki prior 1.8.2 multiple input validation vulnerabilities
CGI
2004/09/08
Marc Ruef
marc dot ruef at computec dot ch
http://www.computec.ch
computec.ch
Marc Ruef
marc dot ruef at computec dot ch
http://www.computec.ch
computec.ch
2004/11/14
2.0
Corrected the plugin structure and added the accuracy values in 1.1. Improved the pattern matching and introduced the plugin changelog in 2.0
tcp
80
open|send GET /tiki-index.php HTTP/1.0\n\n|sleep|close|pattern_exists HTTP/#.# ### *This is Tiki v0. OR HTTP/#.# ### *This is Tiki v1.[0-7].* OR HTTP/#.# ### *This is Tiki v1.8.[0-2]*
80
Check is inspired by the Nessus plugin. As I do know the different attacks I will perhaps develop dedicated plugins for every flaw. See the exploiting information for more technical details.
JeiAr
security at gulftech dot org
http://www.gulftech.org
GulfTech Security Research Team
2004/04/12
http://www.gulftech.org/04112004.php
TikiWiki prior 1.8.2
TikiWiki newer than 1.8.2 or other solutions
Configuration
The remote host is running Tiki Wiki, a content management system written in PHP. There are several input validation vulnerabilities in version prior 1.8.2. These bugs may allow a remote attacker to carry out various attacks such as path disclosure, cross-site scripting, HTML injection, SQL injection, directory traversal, and arbitrary file upload.
You should install or upgrade the software to the latest version. See http://www.tikiwiki.org for more details. Also limit unwanted connections and communications with firewalling if possible.
Approx. 1 hour
Yes
http://www.securityfocus.com/bid/10100/exploit/
Yes
Yes
High
6
8
9
8
High
Nessus is able to do the same check. The flaws are very well documented in the Bugtraq posting and at http://www.securityfocus.com/bid/10100/exploit/
10100
14364
Hacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427
http://www.securityfocus.com/archive/1/360127