|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200611-11] TikiWiki: Multiple vulnerabilities Vulnerability Assessment Details
|
[GLSA-200611-11] TikiWiki: Multiple vulnerabilities |
||
TikiWiki: Multiple vulnerabilities Detailed Explanation for this Vulnerability Assessment The remote host is affected by the vulnerability described in GLSA-200611-11 (TikiWiki: Multiple vulnerabilities) In numerous files TikiWiki provides an empty sort_mode parameter, causing TikiWiki to display additional information, including database authentication credentials, in certain error messages. TikiWiki also improperly sanitizes the "url" request variable sent to tiki-featured_link.php. Impact A possible hacker could cause a database error in various pages of a TikiWiki instance by providing an empty sort_mode request variable, and gain unauthorized access to credentials of the MySQL databases used by TikiWiki. A possible hacker could also entice a user to browse to a specially crafted URL that could run scripts in the scope of the user's browser. Workaround There is no known workaround at this time. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5702 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5703 Solution: All TikiWiki users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-apps/tikiwiki-1.9.6" Network Security Threat Level: Medium Networks Security ID: Vulnerability Assessment Copyright: (C) 2006 Michel Arboi |
||
Cables, Connectors |
Juniper EX4300-24T Layer 3 24 Ports Manageable Ethernet Switch 1 Year Warranty
$195.00
Juniper SRX210HE2-POE SRX210 Services POE Gateway 1 Year Warranty
$165.00
Juniper Networks EX3300-48P 48-Port PoE+ 4x SFP+ Network Switch w/ Power Cord
$43.95
Juniper Networks EX4300-48T 48 Port Gigabit 4 QSFP 40G 2xPSU AFO Network Switch
$89.00
JUNIPER EX3400-48P 48x 1GB PoE+ RJ-45 4x 10GB SFP+ 2x 40GB QSFP+, DUAL AC POWER
$210.00
Juniper EX3400-48P 48-Ports PoE+ 4x SFP+ and 2x QSFP+ Managed Switch Tested
$205.00
Juniper QFX5100-48S-3AFO Switch 48 x 10Gb SFP+, 6x QSFP 40GE, Dual AC Power
$499.00
Juniper EX3300-48P, 48 Port PoE+ Gigabit Network Switch w/ Power cord
$54.99
Juniper Networks EX3300 EX3300-48P 48-Port Gigabit PoE+ Switch
$40.23
JUNIPER EX4550-32F-AFO 32-PORT ETHERNET SWITCH 2x POWER SUPPLY - TESTED
$299.99
|
||
No Discussions have been posted on this vulnerability. |