Tiki CMS/Groupware (TikiWiki) 1.8.1 and earlier allows remote attackers to inject arbitrary code via the (1) Theme, (2) Country, (3) Real Name, or (4) Displayed time zone fields in a User Profile, or the (5) Name, (6) Description, (7) URL, or (8) Country fields in a Directory/Add Site operation.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/10100 | exploit vdb entry patch vendor advisory |
http://marc.info/?l=bugtraq&m=108180073206947&w=2 | mailing list |
http://secunia.com/advisories/11344 | third party advisory vendor advisory |
http://tikiwiki.org/tiki-read_article.php?articleId=66 | patch |