Vulnerabilities > CVE-2007-3930
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Interpretation conflict between Microsoft Internet Explorer and DocuWiki before 2007-06-26b allows remote attackers to inject arbitrary JavaScript and conduct cross-site scripting (XSS) attacks when spellchecking UTF-8 encoded messages via the spell_utf8test function in lib/exe/spellcheck.php, which triggers HTML document identification and script execution by Internet Explorer even though the Content-Type header is text/plain.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 | |
Application | 1 |
Nessus
NASL family | FreeBSD Local Security Checks |
NASL id | FREEBSD_PKG_CDDDE37A39B511DCB3DA001921AB2FA4.NASL |
description | DokuWiki reports : The spellchecker tests the UTF-8 capabilities of the used browser by sending an UTF-8 string to the backend, which will send it back unfiltered. By comparing string length the spellchecker can work around broken implementations. An attacker could construct a form to let users send JavaScript to the spellchecker backend, resulting in malicious JavaScript being executed in their browser. Affected are all versions up to and including 2007-06-26 even when the spell checker is disabled. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 25787 |
published | 2007-07-27 |
reporter | This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/25787 |
title | FreeBSD : dokuwiki -- XSS vulnerability in spellchecker backend (cddde37a-39b5-11dc-b3da-001921ab2fa4) |
code |
|
References
- http://bugs.splitbrain.org/index.php?do=details&task_id=1195
- http://bugs.splitbrain.org/index.php?do=details&task_id=1195
- http://osvdb.org/38319
- http://osvdb.org/38319
- http://secunia.com/advisories/26150
- http://secunia.com/advisories/26150
- http://securityreason.com/securityalert/2908
- http://securityreason.com/securityalert/2908
- http://wiki.splitbrain.org/wiki%3Achanges
- http://wiki.splitbrain.org/wiki%3Achanges
- http://www.securityfocus.com/archive/1/474144/100/0/threaded
- http://www.securityfocus.com/archive/1/474144/100/0/threaded
- http://www.securityfocus.com/bid/24973
- http://www.securityfocus.com/bid/24973
- http://www.vupen.com/english/advisories/2007/2617
- http://www.vupen.com/english/advisories/2007/2617
- https://exchange.xforce.ibmcloud.com/vulnerabilities/35501
- https://exchange.xforce.ibmcloud.com/vulnerabilities/35501