[Japanese]
|
JVNDB-2013-000100
|
Tiki Wiki CMS Groupware vulnerable to SQL injection
|
Tiki Wiki CMS Groupware (Tiki) is a content management system (CMS). Tiki contains a SQL injection vulnerability.
Yuji Tounai of bogus.jp reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
|
CVSS V2 Severity: Base Metrics 7.5 (High) [IPA Score]
- Access Vector: Network
- Access Complexity: Low
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: Partial
- Availability Impact: Partial
|
|
Tiki Software Community Association
- Tiki Wiki CMS Groupware versions prior to 11.1
- Tiki Wiki CMS Groupware versions prior to 10.4
- Tiki Wiki CMS Groupware versions prior to 9.7LTS
- Tiki Wiki CMS Groupware versions prior to 6.13LTS
|
|
An arbitrary SQL command may be executed in the database the product is referencing.
|
[Apply an Update]
Apply the appropriate update for the version of the software being used.
[Apply a Workaround]
If an update cannot be applied, the following workaround may mitigate the affects of this vulnerability.
* Disable feature_search_fulltext (MySQL Full-Text Search) through Preferences
* Delete the tiki-searchresults.php file from the web server
|
Tiki Software Community Association
|
- SQL Injection(CWE-89) [IPA Evaluation]
|
- CVE-2013-4715
|
- JVN : JVN#75720314
- National Vulnerability Database (NVD) : CVE-2013-4715
|
- [2013/11/05]
Web page was published
[2013/11/07]
References : Content was added
|