CVE-2012-0283
Published Jul 13, 2012
Last updated 11 years ago
Overview
- Description
- Cross-site scripting (XSS) vulnerability in the tpl_mediaFileList function in inc/template.php in DokuWiki before 2012-01-25b allows remote attackers to inject arbitrary web script or HTML via the ns parameter in a medialist action to lib/exe/ajax.php.
- Source
- PSIRT-CNA@flexerasoftware.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-79
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:andreas_gohr:dokuwiki:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "12B16E9B-CC3A-4300-B353-363A8B7EB446", "versionEndIncluding": "2012-01-25a" }, { "criteria": "cpe:2.3:a:andreas_gohr:dokuwiki:2005-07-01:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D021EAF4-D850-460C-ABD9-24384F272202" }, { "criteria": "cpe:2.3:a:andreas_gohr:dokuwiki:2005-09-19:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0D500736-2E65-4942-BB14-87E8400DF432" }, { "criteria": "cpe:2.3:a:andreas_gohr:dokuwiki:2005-09-22:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FE9F3578-5DD7-4C23-A05E-1B69A3DE1131" }, { "criteria": "cpe:2.3:a:andreas_gohr:dokuwiki:2006-03-05:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "04F84AF0-7A64-4044-84A5-93A04292B49F" }, { "criteria": "cpe:2.3:a:andreas_gohr:dokuwiki:2006-03-09:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "721A76A3-A352-4BFE-988A-8E7493801821" }, { "criteria": "cpe:2.3:a:andreas_gohr:dokuwiki:2006-11-06:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "25638BDF-056E-40FD-AF69-75E7D6A0AFEB" }, { "criteria": "cpe:2.3:a:andreas_gohr:dokuwiki:2007-06-26:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "79D062E1-A814-47CF-A5B8-1F1126903538" }, { "criteria": "cpe:2.3:a:andreas_gohr:dokuwiki:2007-07-13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F31C0B00-5A0F-4FB7-8410-5946F5F90159" }, { "criteria": "cpe:2.3:a:andreas_gohr:dokuwiki:2008-05-05:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9DD798EB-EFA7-4E29-AB93-E4DED45BA639" }, { "criteria": "cpe:2.3:a:andreas_gohr:dokuwiki:2009-02-14b:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1D6DCFD7-4768-4EFF-A58F-05B3A21ABEB7" }, { "criteria": "cpe:2.3:a:andreas_gohr:dokuwiki:2009-12-25c:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "17804D28-62D1-4DF5-BF32-C4C7FAE76094" }, { "criteria": "cpe:2.3:a:andreas_gohr:dokuwiki:2010-11-07a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FDFB8409-5B32-4511-A26B-95D5F6159564" }, { "criteria": "cpe:2.3:a:andreas_gohr:dokuwiki:2011-05-25:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8F4F37E4-BF85-4385-A71C-D9B1ACDE1906" }, { "criteria": "cpe:2.3:a:andreas_gohr:dokuwiki:2011-05-25a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C568179A-1008-4428-8F7B-0FF40D2627EB" }, { "criteria": "cpe:2.3:a:andreas_gohr:dokuwiki:2011-05-25c:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CBACBE66-DDDF-4783-8E9F-CA488E79326E" }, { "criteria": "cpe:2.3:a:andreas_gohr:dokuwiki:2012-01-25:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "266A9481-905C-4F8B-943B-73F023EC851A" } ], "operator": "OR" } ] } ]