Moderately critical

Foswiki Multiple Script Insertion Vulnerabilities

-

Release Date:  2012-02-03    Last Update:  2012-09-26    Views:  2,073

Secunia Advisory SA47849

Where:

Log in with your Secunia community profile. If you are an IT security professional, request a trial of the Secunia VIM.

Impact:

Log in with your Secunia community profile. If you are an IT security professional, request a trial of the Secunia VIM.

Solution Status:

Log in with your Secunia community profile. If you are an IT security professional, request a trial of the Secunia VIM.

Software:

Log in with your Secunia community profile. If you are an IT security professional, request a trial of the Secunia VIM.

CVE Reference(s):

Log in with your Secunia community profile. If you are an IT security professional, request a trial of the Secunia VIM.

Description


Sony has discovered multiple vulnerabilities in Foswiki, which can be exploited by malicious users to conduct script insertion attacks


Log in with your Secunia community profile to view the full description of this Advisory. If you are an IT security professional, request a trial of the Secunia VIM.

If you are not a member of the Secunia community, you can sign up here for free.

Do you have additional information related to this advisory?

Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this information to vuln@secunia.com

Subject: Foswiki Multiple Script Insertion Vulnerabilities

User Message
csirac2 RE: Foswiki Multiple Script Insertion Vulnerabilities
Member 3rd Feb, 2012 17:02
Score: 0
Posts: 3
User Since: 3rd Feb 2012
System Score: N/A
Location: AU
Last edited on 3rd Feb, 2012 17:02
We are tracking this at http://foswiki.org/Tasks/Item11498
Was this reply relevant?
+0
-0
csirac2 RE: Foswiki Multiple Script Insertion Vulnerabilities
Member 3rd Feb, 2012 17:05
Score: 0
Posts: 3
User Since: 3rd Feb 2012
System Score: N/A
Location: AU
Last edited on 3rd Feb, 2012 17:12
To mitigate the impact of trivial JS injection as demonstrated by Sony, public Foswiki sites which allow unmoderated user registration should customize their NewUserTemplate to restrict VIEW/CHANGE access on those new user profile topics, and also check to see if all webs (including Sandbox) have ACLs set to deny new users CHANGE permission everywhere in the wiki.

Typically, public Foswiki installations grant CHANGE permission to groups, and then add trusted users to those groups.
Was this reply relevant?
+0
-0
csirac2 RE: Foswiki Multiple Script Insertion Vulnerabilities
Member 7th Feb, 2012 00:21
Score: 0
Posts: 3
User Since: 3rd Feb 2012
System Score: N/A
Location: AU
Last edited on 7th Feb, 2012 00:21
Security alert:: http://foswiki.org/Support/SecurityAlert-CVE-2012-...
Was this reply relevant?
+0
-0

-

You must be logged in to post a comment.