Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-12980

Опубликовано: 21 авг. 2017
Источник: debian
EPSS Низкий

Описание

DokuWiki through 2017-02-19c has stored XSS when rendering a malicious RSS or Atom feed, in /inc/parser/xhtml.php. An attacker can create or edit a wiki that uses RSS or Atom data from an attacker-controlled server to trigger JavaScript execution. The JavaScript can be in an author field, as demonstrated by the dc:creator element.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
dokuwikifixed0.0.20180422.a-1package
dokuwikino-dsajessiepackage
dokuwikino-dsawheezypackage

Примечания

  • https://github.com/splitbrain/dokuwiki/issues/2081

  • https://github.com/splitbrain/dokuwiki/commit/f883db117a4fdeae72071db41b3ef5932d6335da

EPSS

Процентиль: 67%
0.00543
Низкий

Связанные уязвимости

CVSS3: 6.1
ubuntu
больше 8 лет назад

DokuWiki through 2017-02-19c has stored XSS when rendering a malicious RSS or Atom feed, in /inc/parser/xhtml.php. An attacker can create or edit a wiki that uses RSS or Atom data from an attacker-controlled server to trigger JavaScript execution. The JavaScript can be in an author field, as demonstrated by the dc:creator element.

CVSS3: 6.1
nvd
больше 8 лет назад

DokuWiki through 2017-02-19c has stored XSS when rendering a malicious RSS or Atom feed, in /inc/parser/xhtml.php. An attacker can create or edit a wiki that uses RSS or Atom data from an attacker-controlled server to trigger JavaScript execution. The JavaScript can be in an author field, as demonstrated by the dc:creator element.

CVSS3: 6.1
github
больше 3 лет назад

DokuWiki through 2017-02-19c has stored XSS when rendering a malicious RSS or Atom feed, in /inc/parser/xhtml.php. An attacker can create or edit a wiki that uses RSS or Atom data from an attacker-controlled server to trigger JavaScript execution. The JavaScript can be in an author field, as demonstrated by the dc:creator element.

EPSS

Процентиль: 67%
0.00543
Низкий