Tiki Wiki CMS up to 12.9/15.2/16.x article_image.php geo_zoomlevel_to_found_location cross site scripting
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 4.1 | $0-$5k | 0.00 |
Summary
A vulnerability has been found in Tiki Wiki CMS up to 12.9/15.2/16.x and classified as problematic. This affects an unknown part of the file article_image.php. This manipulation of the argument geo_zoomlevel_to_found_location causes cross site scripting. This vulnerability is tracked as CVE-2016-9889. The attack is possible to be carried out remotely. No exploit exists. The affected component should be upgraded.
Details
A vulnerability has been found in Tiki Wiki CMS up to 12.9/15.2/16.x (Content Management System) and classified as problematic. Affected by this vulnerability is an unknown part of the file article_image.php. The manipulation of the argument geo_zoomlevel_to_found_location with an unknown input leads to a cross site scripting vulnerability. The CWE definition for the vulnerability is CWE-79. The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. As an impact it is known to affect integrity. The summary by CVE is:
Some forms with the parameter geo_zoomlevel_to_found_location in Tiki Wiki CMS 12.x before 12.10 LTS, 15.x before 15.3 LTS, and 16.x before 16.1 don't have the input sanitized, related to tiki-setup.php and article_image.php. The impact is XSS.
The weakness was disclosed 12/23/2016 (Website). The advisory is shared at tiki.org. This vulnerability is known as CVE-2016-9889. The attack can be launched remotely. The exploitation doesn't need any form of authentication. It demands that the victim is doing some kind of user interaction. Technical details are known, but no exploit is available. MITRE ATT&CK project uses the attack technique T1059.007 for this issue.
By approaching the search of inurl:article_image.php it is possible to find vulnerable targets with Google Hacking.
Upgrading to version 12.10 or 15.3 eliminates this vulnerability.
The vulnerability is also documented in the databases at SecurityFocus (BID 95083†) and SecurityTracker (ID 1037531†). The entry VDB-94656 is pretty similar. Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
Product
Type
Vendor
Name
Version
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 4.3VulDB Meta Temp Score: 4.1
VulDB Base Score: 4.3
VulDB Temp Score: 4.1
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Cross site scriptingCWE: CWE-79 / CWE-94 / CWE-74
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
Google Hack: 🔍
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: Wiki CMS 12.10/15.3
Timeline
12/07/2016 🔍12/23/2016 🔍
12/23/2016 🔍
12/23/2016 🔍
12/24/2016 🔍
10/12/2022 🔍
Sources
Advisory: tiki.orgStatus: Confirmed
CVE: CVE-2016-9889 (🔍)
GCVE (CVE): GCVE-0-2016-9889
GCVE (VulDB): GCVE-100-94657
SecurityFocus: 95083
SecurityTracker: 1037531 - TikiWiki Input Validation Flaw in 'geo_zoomlevel_to_found_location' Parameter Lets Remote Users Conduct Cross-Site Scripting Attacks
See also: 🔍
Entry
Created: 12/23/2016 10:14Updated: 10/12/2022 15:11
Changes: 12/23/2016 10:14 (42), 05/17/2018 23:27 (14), 10/12/2022 15:11 (2)
Complete: 🔍
Cache ID: 216::103
Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
No comments yet. Languages: en.
Please log in to comment.