DokuWiki is vulnerable to a cross-site scripting attack.
Package | www-apps/dokuwiki on all architectures |
---|---|
Affected versions | < 20061106 |
Unaffected versions | >= 20061106 |
DokuWiki is a simple to use wiki aimed at creating documentation.
DokuWiki does not sanitize user input to the GET variable 'media' in the fetch.php file.
An attacker could entice a user to click a specially crafted link and inject CRLF characters into the variable. This would allow the creation of new lines or fields in the returned HTTP Response header, which would permit the attacker to execute arbitrary scripts in the context of the user's browser.
Replace the following line in lib/exe/fetch.php:
$MEDIA = getID('media',false); // no cleaning - maybe external
with
$MEDIA = preg_replace('/[\x00-\x1F]+/s','',getID('media',false));
All DokuWiki users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=www-apps/dokuwiki-20061106"
Release date
April 12, 2007
Latest revision
April 12, 2007: 01
Severity
low
Exploitable
remote
Bugzilla entries