Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2017-12980

Опубликовано: 21 авг. 2017
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.3
CVSS3: 6.1

Описание

DokuWiki through 2017-02-19c has stored XSS when rendering a malicious RSS or Atom feed, in /inc/parser/xhtml.php. An attacker can create or edit a wiki that uses RSS or Atom data from an attacker-controlled server to trigger JavaScript execution. The JavaScript can be in an author field, as demonstrated by the dc:creator element.

РелизСтатусПримечание
artful

ignored

end of life
bionic

ignored

end of standard support, was needed
cosmic

not-affected

0.0.20180422.a-2
devel

not-affected

0.0.20180422.a-2
disco

not-affected

0.0.20180422.a-2
eoan

not-affected

0.0.20180422.a-2
esm-apps/bionic

needed

esm-apps/focal

not-affected

0.0.20180422.a-2
esm-apps/jammy

not-affected

0.0.20180422.a-2
esm-apps/noble

not-affected

0.0.20180422.a-2

Показывать по

EPSS

Процентиль: 67%
0.00543
Низкий

4.3 Medium

CVSS2

6.1 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.1
nvd
больше 8 лет назад

DokuWiki through 2017-02-19c has stored XSS when rendering a malicious RSS or Atom feed, in /inc/parser/xhtml.php. An attacker can create or edit a wiki that uses RSS or Atom data from an attacker-controlled server to trigger JavaScript execution. The JavaScript can be in an author field, as demonstrated by the dc:creator element.

CVSS3: 6.1
debian
больше 8 лет назад

DokuWiki through 2017-02-19c has stored XSS when rendering a malicious ...

CVSS3: 6.1
github
больше 3 лет назад

DokuWiki through 2017-02-19c has stored XSS when rendering a malicious RSS or Atom feed, in /inc/parser/xhtml.php. An attacker can create or edit a wiki that uses RSS or Atom data from an attacker-controlled server to trigger JavaScript execution. The JavaScript can be in an author field, as demonstrated by the dc:creator element.

EPSS

Процентиль: 67%
0.00543
Низкий

4.3 Medium

CVSS2

6.1 Medium

CVSS3