blob: 9cd741f888eb6ace91ecbaf740bae038c8e1f3d6 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200611-11">
<title>TikiWiki: Multiple vulnerabilities</title>
TikiWiki allows for the disclosure of MySQL database authentication
credentials and for cross-site scripting attacks.
<product type="ebuild">tikiwiki</product>
<announced>November 20, 2006</announced>
<revised>November 20, 2006: 01</revised>
<package name="www-apps/tikiwiki" auto="yes" arch="*">
<unaffected range="ge">1.9.6</unaffected>
<vulnerable range="lt">1.9.6</vulnerable>
TikiWiki is an open source content management system written in PHP.
In numerous files TikiWiki provides an empty sort_mode parameter,
causing TikiWiki to display additional information, including database
authentication credentials, in certain error messages. TikiWiki also
improperly sanitizes the "url" request variable sent to
<impact type="normal">
An attacker could cause a database error in various pages of a TikiWiki
instance by providing an empty sort_mode request variable, and gain
unauthorized access to credentials of the MySQL databases used by
TikiWiki. An attacker could also entice a user to browse to a specially
crafted URL that could run scripts in the scope of the user's browser.
There is no known workaround at this time.
All TikiWiki users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=www-apps/tikiwiki-1.9.6&quot;</code>
<uri link="">CVE-2006-5702</uri>
<uri link="">CVE-2006-5703</uri>
<metadata tag="requester" timestamp="Fri, 10 Nov 2006 17:34:20 +0000">
<metadata tag="submitter" timestamp="Fri, 10 Nov 2006 18:20:06 +0000">
<metadata tag="bugReady" timestamp="Mon, 13 Nov 2006 22:24:46 +0000">