Cross-site scripting (XSS) vulnerability in the tpl_mediaFileList function in inc/template.php in DokuWiki before 2012-01-25b allows remote attackers to inject arbitrary web script or HTML via the ns parameter in a medialist action to lib/exe/ajax.php.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/54439 | vdb entry |
http://security.gentoo.org/glsa/glsa-201301-07.xml | vendor advisory |
http://bugs.dokuwiki.org/index.php?do=details&task_id=2561 | vendor advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090755.html | vendor advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090938.html | vendor advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090899.html | vendor advisory |
http://secunia.com/secunia_research/2012-24/ | vendor advisory |