CVE-2006-2635

Multiple cross-site scripting (XSS) vulnerabilities in Tikiwiki (aka Tiki CMS/Groupware) 1.9.x allow remote attackers to inject arbitrary web script or HTML via malformed nested HTML tags such as "<scr<script>ipt>" in (1) offset and (2) days parameters in (a) tiki-lastchanges.php, the (3) find and (4) offset parameters in (b) tiki-orphan_pages.php, the (5) offset and (6) initial parameters in (c) tiki-listpages.php, and (7) an unspecified field in (d) tiki-remind_password.php; and allow remote authenticated users with admin privileges to inject arbitrary web script or HTML via (8) an unspecified field in a metatags action in (e) tiki-admin.php, the (9) offset parameter in (f) tiki-admin_rssmodules.php, the (10) offset and (11) max parameters in (g) tiki-syslog.php, the (12) numrows parameter in (h) tiki-adminusers.php, (13) an unspecified field in (i) tiki-adminusers.php, (14) an unspecified field in (j) tiki-admin_hotwords.php, unspecified fields in (15) "Assign new module" and (16) "Create new user module" in (k) tiki-admin_modules.php, (17) an unspecified field in "Add notification" in (l) tiki-admin_notifications.php, (18) the offset parameter in (m) tiki-admin_notifications.php, the (19) Name and (20) Dsn fields in (o) tiki-admin_dsn.php, the (21) offset parameter in (p) tiki-admin_content_templates.php, (22) an unspecified field in "Create new template" in (q) tiki-admin_content_templates.php, and the (23) offset parameter in (r) tiki-admin_chat.php.
References
Link Resource
http://secunia.com/advisories/20334 Exploit Patch Vendor Advisory
http://securityreason.com/securityalert/976
http://tikiwiki.org/tiki-read_article.php?articleId=131
http://www.osvdb.org/26048
http://www.osvdb.org/26049
http://www.osvdb.org/26050
http://www.osvdb.org/26051
http://www.osvdb.org/26052
http://www.osvdb.org/26053
http://www.osvdb.org/26054
http://www.osvdb.org/26055
http://www.osvdb.org/26056
http://www.osvdb.org/26057
http://www.osvdb.org/26058
http://www.osvdb.org/26059
http://www.osvdb.org/26060
http://www.osvdb.org/26061
http://www.osvdb.org/26062
http://www.securityfocus.com/archive/1/435127/100/0/threaded
http://www.securityfocus.com/archive/1/436432/100/0/threaded
http://www.securityfocus.com/bid/18143 Exploit
http://www.vupen.com/english/advisories/2006/2024 Vendor Advisory
http://secunia.com/advisories/20334 Exploit Patch Vendor Advisory
http://securityreason.com/securityalert/976
http://tikiwiki.org/tiki-read_article.php?articleId=131
http://www.osvdb.org/26048
http://www.osvdb.org/26049
http://www.osvdb.org/26050
http://www.osvdb.org/26051
http://www.osvdb.org/26052
http://www.osvdb.org/26053
http://www.osvdb.org/26054
http://www.osvdb.org/26055
http://www.osvdb.org/26056
http://www.osvdb.org/26057
http://www.osvdb.org/26058
http://www.osvdb.org/26059
http://www.osvdb.org/26060
http://www.osvdb.org/26061
http://www.osvdb.org/26062
http://www.securityfocus.com/archive/1/435127/100/0/threaded
http://www.securityfocus.com/archive/1/436432/100/0/threaded
http://www.securityfocus.com/bid/18143 Exploit
http://www.vupen.com/english/advisories/2006/2024 Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:tiki:tikiwiki_cms\/groupware:1.9.0:*:*:*:*:*:*:*
cpe:2.3:a:tiki:tikiwiki_cms\/groupware:1.9.0:rc1:*:*:*:*:*:*
cpe:2.3:a:tiki:tikiwiki_cms\/groupware:1.9.0:rc2:*:*:*:*:*:*
cpe:2.3:a:tiki:tikiwiki_cms\/groupware:1.9.0:rc3:*:*:*:*:*:*
cpe:2.3:a:tiki:tikiwiki_cms\/groupware:1.9.1:*:*:*:*:*:*:*
cpe:2.3:a:tiki:tikiwiki_cms\/groupware:1.9.2:*:*:*:*:*:*:*
cpe:2.3:a:tiki:tikiwiki_cms\/groupware:1.9.3:*:*:*:*:*:*:*
cpe:2.3:a:tiki:tikiwiki_cms\/groupware:1.9.3.1:*:*:*:*:*:*:*
cpe:2.3:a:tiki:tikiwiki_cms\/groupware:1.9.3.2:*:*:*:*:*:*:*
cpe:2.3:a:tiki:tikiwiki_cms\/groupware:1.9.4:*:*:*:*:*:*:*
cpe:2.3:a:tiki:tikiwiki_cms\/groupware:1.9.5:*:*:*:*:*:*:*
cpe:2.3:a:tiki:tikiwiki_cms\/groupware:1.9.6:*:*:*:*:*:*:*
cpe:2.3:a:tiki:tikiwiki_cms\/groupware:1.9.7:*:*:*:*:*:*:*
cpe:2.3:a:tiki:tikiwiki_cms\/groupware:1.9.8:*:*:*:*:*:*:*
cpe:2.3:a:tiki:tikiwiki_cms\/groupware:1.9.8.1:*:*:*:*:*:*:*
cpe:2.3:a:tiki:tikiwiki_cms\/groupware:1.9.9:*:*:*:*:*:*:*
cpe:2.3:a:tiki:tikiwiki_cms\/groupware:1.9.10:*:*:*:*:*:*:*
cpe:2.3:a:tiki:tikiwiki_cms\/groupware:1.9.11:*:*:*:*:*:*:*

History

21 Nov 2024, 00:11

Type Values Removed Values Added
References () http://secunia.com/advisories/20334 - Exploit, Patch, Vendor Advisory () http://secunia.com/advisories/20334 - Exploit, Patch, Vendor Advisory
References () http://securityreason.com/securityalert/976 - () http://securityreason.com/securityalert/976 -
References () http://tikiwiki.org/tiki-read_article.php?articleId=131 - () http://tikiwiki.org/tiki-read_article.php?articleId=131 -
References () http://www.osvdb.org/26048 - () http://www.osvdb.org/26048 -
References () http://www.osvdb.org/26049 - () http://www.osvdb.org/26049 -
References () http://www.osvdb.org/26050 - () http://www.osvdb.org/26050 -
References () http://www.osvdb.org/26051 - () http://www.osvdb.org/26051 -
References () http://www.osvdb.org/26052 - () http://www.osvdb.org/26052 -
References () http://www.osvdb.org/26053 - () http://www.osvdb.org/26053 -
References () http://www.osvdb.org/26054 - () http://www.osvdb.org/26054 -
References () http://www.osvdb.org/26055 - () http://www.osvdb.org/26055 -
References () http://www.osvdb.org/26056 - () http://www.osvdb.org/26056 -
References () http://www.osvdb.org/26057 - () http://www.osvdb.org/26057 -
References () http://www.osvdb.org/26058 - () http://www.osvdb.org/26058 -
References () http://www.osvdb.org/26059 - () http://www.osvdb.org/26059 -
References () http://www.osvdb.org/26060 - () http://www.osvdb.org/26060 -
References () http://www.osvdb.org/26061 - () http://www.osvdb.org/26061 -
References () http://www.osvdb.org/26062 - () http://www.osvdb.org/26062 -
References () http://www.securityfocus.com/archive/1/435127/100/0/threaded - () http://www.securityfocus.com/archive/1/435127/100/0/threaded -
References () http://www.securityfocus.com/archive/1/436432/100/0/threaded - () http://www.securityfocus.com/archive/1/436432/100/0/threaded -
References () http://www.securityfocus.com/bid/18143 - Exploit () http://www.securityfocus.com/bid/18143 - Exploit
References () http://www.vupen.com/english/advisories/2006/2024 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/2024 - Vendor Advisory

Information

Published : 2006-05-30 10:02

Updated : 2024-11-21 00:11


NVD link : CVE-2006-2635

Mitre link : CVE-2006-2635

CVE.ORG link : CVE-2006-2635


JSON object : View

Products Affected

tiki

  • tikiwiki_cms\/groupware
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')