Summary
This host is installed with TWiki and is
prone to multiple cross-site scripting vulnerabilities.
Impact
Successful exploitation will allow remote
attackers to execute arbitrary HTML and script code in a users browser session in the context of an affected site.
Impact Level: Application
Solution
Update the listed hotfixes or download and
update mentioned hotfixes in the advisory from the below link, http://www.twiki.org/cgi-bin/view/Codev/SecurityAlert-CVE-2014-9325
Insight
Multiple errors exist as input related to
'QUERYSTRING' and 'QUERYPARAMSTRING' is not properly sanitised within lib/TWiki.pm and lib/TWiki/UI/View.pm before being returned to the user.
Affected
TWiki versions 6.0.1
Detection
Send a crafted data via HTTP GET request
and check whether it is able to read cookie or not.
References
Updated on 2017-03-28
Severity
Classification
-
CVE CVE-2014-9325 -
CVSS Base Score: 4.3
AV:N/AC:M/Au:N/C:N/I:P/A:N
Related Vulnerabilities
- 1024 CMS 1.1.0 Beta 'force_download.php' Local File Include Vulnerability
- Allegro RomPager HTTP Referer Header Cross Site Scripting Vulnerability
- Apache Tomcat RemoteFilterValve Security Bypass Vulnerability
- Apache Struts2 showcase namespace XSS Vulnerability
- Apache Rave User Information Disclosure Vulnerability