Advertisement






WikiNi Persistent Cross Site Scripting Vulnerability

CVE Category Price Severity
CVE-2020-27374 CWE-79 $500 High
Author Risk Exploitation Type Date
Unknown High Remote 2006-05-31
CPE
cpe:cpe:/a:wikini:wikini
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H 0.01173 0.00111

CVSS vector description

Our sensors found this exploit at: http://cxsecurity.com/ascii/WLB-2006050175

Below is a copy:

Hi,

I've found a vulnerability more than 2 months ago, and notified the developers, but still no answer, so I'm posting here.

http://zone14.free.fr/advisories/3/

Vendor: WikiNi

Vulnerable: WikiNi 0.4.2 and below

Persistent Cross Site Scripting

A persistent XSS vulnerability is the most dangerous kind of XSS vulnerabilities, as the data submitted by the malicious user is stored permanently on the server. It could potentially hit a large number of other users with little need for social engineering.

Just edit a page and insert: ""<script>alert('XSS Vulnerable');</script>""

Restrictions

The attacker needs to have the rights to edit at least one page of the wiki, but most of the time it is the case. Moreover, WikiNi 0.4.2 is used on more than 100,000 pages according to Google.

--Raphal HUCK

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum