Vulnerability Details : CVE-2012-2129
Potential exploit
Cross-site scripting (XSS) vulnerability in doku.php in DokuWiki 2012-01-25 Angua allows remote attackers to inject arbitrary web script or HTML via the target parameter in an edit action.
Vulnerability category: Cross site scripting (XSS)
Products affected by CVE-2012-2129
- cpe:2.3:a:andreas_gohr:dokuwiki:2012-01-25:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2012-2129
0.83%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 72 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2012-2129
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST |
CWE ids for CVE-2012-2129
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-2129
-
http://ircrash.com/uploads/dokuwiki.txt
502 Bad GatewayExploit
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/74907
DokuWiki doku.php cross-site scripting CVE-2012-2129 Vulnerability Report
-
https://bugzilla.redhat.com/show_bug.cgi?id=815122
815122 – (CVE-2012-2128, CVE-2012-2129) CVE-2012-2128 CVE-2012-2129 dokuwiki: XSS and CSRF due improper escaping of 'target' parameter in preprocessing edit form data
-
http://seclists.org/bugtraq/2012/Apr/121
Bugtraq: DokuWiki Ver.2012/01/25 CSRF Add User Exploit
-
https://github.com/splitbrain/dokuwiki/commit/ff71173477e54774b5571015d49d944f51cb8a26
escape target error message (SECURITY) FS#2487 FS#2488 · splitbrain/dokuwiki@ff71173 · GitHub
-
http://www.openwall.com/lists/oss-security/2012/04/22/4
oss-security - CVE Request -- DokuWiki: XSS and CSRF due improper escaping of 'target' parameter in preprocessing edit form data
-
http://bugs.dokuwiki.org/index.php?do=details&task_id=2487
FS#2487 Bugtraq report of XSS in edit page "target" parameter
-
http://www.securityfocus.com/bid/53041
DokuWiki 'target' Parameter Cross Site Scripting Vulnerability
-
https://bugs.gentoo.org/show_bug.cgi?id=412891
412891 – (CVE-2012-2129) <www-apps/dokuwiki-20110525a: "target" Cross-Site Scripting Vulnerability (CVE-2012-{2128,2129})
-
http://www.openwall.com/lists/oss-security/2012/04/23/1
oss-security - Re: CVE Request -- DokuWiki: XSS and CSRF due improper escaping of 'target' parameter in preprocessing edit form data
-
http://secunia.com/advisories/48848
Sign in
Jump to