Published:2005/05/19  Last Updated:2008/05/21

JVN#465742E4
Wiki clone cross-site scripting vulnerability

Overview

Some Wiki clones contain a vulnerability which could lead to cross-site scripting in their file attachment function. This could allow an attacker to execute an arbitrary script on the browser of a Wiki user.

Products Affected

  • Wiki clones having a file-attachment function

Description

Impact

An arbitrary script may be executed on the browser of the user who viewed an attached file.

Solution

Vendor Status

Vendor Status Last Update Vendor Notes
TANIGUCHI Takaki Vulnerable 2005/05/20
FreeStyle Wiki Project Vulnerable 2005/05/19
Hiki development team Vulnerable 2005/05/20
PukiWiki Developers Team Vulnerable 2005/10/13
IWATSUKI Hiroyuki Vulnerable 2005/05/19

References

JPCERT/CC Addendum

Credit

Yoshinori Ohta of Business Architects Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the vendors under Information Security Early Warning Partnership.

Other Information

JPCERT Alert
JPCERT Reports JPCERT-WR-2005-2001 JPCERT/CC REPORT 2005-05-25
CERT Advisory
CPNI Advisory
TRnotes
CVE
JVN iPedia JVNDB-2005-000771

Update History