Plugin ID | 180 |
Plugin name | TikiWiki prior 1.8.2 multiple input validation vulnerabilities |
Plugin filename | TikiWiki prior 1.8.2 multiple input validation vulnerabilities.plugin |
Plugin filesize | 3828 bytes |
Plugin family | CGI |
Plugin created name | Marc Ruef |
Plugin created email | marc dot ruef at computec dot ch |
Plugin created web | http://www.computec.ch |
Plugin created company | computec.ch |
Plugin created date | 2004/09/08 |
Plugin updated name | Marc Ruef |
Plugin updated email | marc dot ruef at computec dot ch |
Plugin updated web | http://www.computec.ch |
Plugin updated company | computec.ch |
Plugin updated date | 2004/11/14 |
Plugin version | 2.0 |
Plugin changelog | Corrected the plugin structure and added the accuracy values in 1.1. Improved the pattern matching and introduced the plugin changelog in 2.0 |
Plugin protocol | tcp |
Plugin port | 80 |
Plugin procedure detection | open|send GET /tiki-index.php HTTP/1.0\n\n|sleep|close|pattern_exists HTTP/#.# ### *This is Tiki v0. OR HTTP/#.# ### *This is Tiki v1.[0-7].* OR HTTP/#.# ### *This is Tiki v1.8.[0-2]* |
Plugin detection accuracy | 80 |
Plugin comment | Check is inspired by the Nessus plugin. As I do know the different attacks I will perhaps develop dedicated plugins for every flaw. See the exploiting information for more technical details. |
Bug published name | JeiAr |
Bug published email | security at gulftech dot org |
Bug published web | http://www.gulftech.org |
Bug published company | GulfTech Security Research Team |
Bug published date | 2004/04/12 |
Bug advisory | http://www.gulftech.org/04112004.php |
Bug affected | TikiWiki prior 1.8.2 |
Bug not affected | TikiWiki newer than 1.8.2 or other solutions |
Bug vulnerability class | Configuration |
Bug description | The remote host is running Tiki Wiki, a content management system written in PHP. There are several input validation vulnerabilities in version prior 1.8.2. These bugs may allow a remote attacker to carry out various attacks such as path disclosure, cross-site scripting, HTML injection, SQL injection, directory traversal, and arbitrary file upload. |
Bug solution | You should install or upgrade the software to the latest version. See http://www.tikiwiki.org for more details. Also limit unwanted connections and communications with firewalling if possible. |
Bug fixing time | Approx. 1 hour |
Bug exploit availability | Yes |
Bug exploit url | http://www.securityfocus.com/bid/10100/exploit/ |
Bug remote | Yes |
Bug local | Yes |
Bug severity | High |
Bug popularity | 6 |
Bug simplicity | 8 |
Bug impact | 9 |
Bug risk | 8 |
Bug Nessus risk | High |
Bug check tools | Nessus is able to do the same check. The flaws are very well documented in the Bugtraq posting and at http://www.securityfocus.com/bid/10100/exploit/ |
Source SecurityFocus BID | 10100 |
Source Nessus ID | 14364 |
Source Literature | Hacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427 |
Source Misc. | http://www.securityfocus.com/archive/1/360127 |