Bug 815122 (CVE-2012-2128, CVE-2012-2129) - CVE-2012-2128 CVE-2012-2129 dokuwiki: XSS and CSRF due improper escaping of 'target' parameter in preprocessing edit form data
Summary: CVE-2012-2128 CVE-2012-2129 dokuwiki: XSS and CSRF due improper escaping of '...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2012-2128, CVE-2012-2129
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 815123 815124
Blocks:
TreeView+ depends on / blocked
 
Reported: 2012-04-22 17:09 UTC by Jan Lieskovsky
Modified: 2019-09-29 12:52 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2012-11-12 15:28:53 UTC
Embargoed:


Attachments (Terms of Use)

Description Jan Lieskovsky 2012-04-22 17:09:33 UTC
A cross-site scripting (XSS) and cross-site request forgery (CSRF) flaws were found in the way DokuWiki, a standards compliant, simple to use Wiki, performed sanitization of the 'target' parameter when preprocessing edit form data. A remote attacker could provide a specially-crafted URL, which once visited by a valid DokuWiki user would lead to arbitrary HTML or web script execution in the context of logged in DokuWiki user.

References:
[1] https://secunia.com/advisories/48848/
[2] http://ircrash.com/uploads/dokuwiki.txt
[3] https://bugs.gentoo.org/show_bug.cgi?id=412891

Discovered by : Khashayar Fereidani

Proof of Concept URL: http://sitename/doku.php?do=edit&id=S9F8W2A&target=<script>alert(123)</script>

Comment 1 Jan Lieskovsky 2012-04-22 17:16:50 UTC
Upstream bug report for the XSS issue:
[4] http://bugs.dokuwiki.org/index.php?do=details&task_id=2487

Upstream bug report for the CSRF issue:
[5] http://bugs.dokuwiki.org/index.php?do=details&task_id=2488

Comment 2 Jan Lieskovsky 2012-04-22 17:25:12 UTC
CVE Request:
[6] http://www.openwall.com/lists/oss-security/2012/04/22/4

Comment 3 Jan Lieskovsky 2012-04-22 17:26:15 UTC
This issue affects the versions of the dokuwiki package, as shipped with Fedora EPEL 5 and Fedora EPEL 6. Please schedule an update.

--

This issue affects the versions of the dokuwiki package, as shipped with Fedora release of 15 and 16. Please schedule an update.

Comment 4 Jan Lieskovsky 2012-04-22 17:27:09 UTC
Created dokuwiki tracking bugs for this issue

Affects: fedora-all [bug 815123]
Affects: epel-all [bug 815124]

Comment 5 Jan Lieskovsky 2012-04-23 07:17:45 UTC
(In reply to comment #1)

The CVE identifier of CVE-2012-2129 has been assigned to the XSS issue (upstream bug #2487):

> Upstream bug report for the XSS issue:
> [4] http://bugs.dokuwiki.org/index.php?do=details&task_id=2487
> 

and identifier of CVE-2012-2128 to the CSRF / XSRF issue (upstream bug #2488):

> Upstream bug report for the CSRF issue:
> [5] http://bugs.dokuwiki.org/index.php?do=details&task_id=2488

http://www.openwall.com/lists/oss-security/2012/04/23/1

Comment 6 Fedora Update System 2012-05-02 20:50:14 UTC
dokuwiki-0-0.11.20110525.a.fc17 has been pushed to the Fedora 17 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 7 Fedora Update System 2012-05-11 22:03:52 UTC
dokuwiki-0-0.11.20110525.a.el5 has been pushed to the Fedora EPEL 5 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 8 Fedora Update System 2012-05-11 22:04:31 UTC
dokuwiki-0-0.9.20110525.a.el6 has been pushed to the Fedora EPEL 6 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 9 Fedora Update System 2012-05-27 01:51:34 UTC
dokuwiki-0-0.10.20110525.a.fc16 has been pushed to the Fedora 16 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 10 Fedora Update System 2012-06-12 00:26:56 UTC
dokuwiki-0-0.10.20110525.a.fc15 has been pushed to the Fedora 15 stable repository.  If problems still persist, please make note of it in this bug report.


Note You need to log in before you can comment on or make changes to this bug.