| VID |
21424 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The MoniWiki has a 'wiki.php' Cross-Site Scripting Vulnerability. MoniWiki is a Wiki Web program. MoniWiki 1.0.8 and earlier versions are vulnerable to cross-site scripting vulnerability, caused by a failure of the application to properly validate user-supplied input in the 'wiki.php' file. A remote attacker could create a specially crafted URL link to the 'wiki.php' scripts containing malicious script code, and then could persuade a target user to click it. Once the URL is clicked, the embedded codes would be executed in the victim's Web browser. A remote attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.
* References: http://securitytracker.com/alerts/2004/Oct/1011912.html http://www.osvdb.org/displayvuln.php?osvdb_id=11124
* Platforms Affected: MoniWiki 1.0.8 and earlier Any operating system Any version |
| Recommendation |
Upgrade to the latest version of MoniWiki (1.0.9 or later), available from the MoniWiki Web page at http://moniwiki.sourceforge.net/wiki.php |
| Related URL |
CVE-2004-1632 (CVE) |
| Related URL |
11516 (SecurityFocus) |
| Related URL |
17835 (ISS) |
|