Description
|
|
Multiple vulnerabilities have been identified in TikiWiki, which could be exploited by attackers to disclose sensitive information or execute arbitrary scripting code.
The first issue is due to an input validation error in the "tiki-featured_link.php" script when processing the "url" parameter, which could be exploited by attackers to cause arbitrary scripting code to be executed by the user's browser in the security context of an affected Web site.
The second flaw is due to input validation errors in various scripts that do not properly handle an empty "sort_mode" parameter, which could be exploited by attackers to gain knowledge of sensitive information (e.g. full path) returned via certain SQL error messages.
|