Description
|
|
Multiple vulnerabilities have been identified in Tiki Wiki CMS Groupware, which could allow cross site scripting, cross site request forgery and local file inclusion attacks.
The first issue is caused by an input validation error in the "tiki-jsplugin.php" script when processing the "language" parameter, which could be exploited by attackers to include or disclose the contents of local files with the privileges of the web server.
The second vulnerability is caused by an input validation error in the "tiki-adminusers.php" script when processing requests, which could be exploited by attackers to manipulate certain data (e.g. change the admin password) by convincing an administrator to visit a malicious web page.
The third issue is caused by an input validation error in the "tiki-edit_wiki_section.php" script when processing the "type" parameter, which could be exploited by attackers to cause arbitrary scripting code to be executed by the user's browser in the security context of an affected site.
|