Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2016-4561 (GCVE-0-2016-4561)
Vulnerability from cvelistv5 – Published: 2016-05-10 19:00 – Updated: 2024-08-06 00:32
VLAI?
EPSS
Summary
Cross-site scripting (XSS) vulnerability in the cgierror function in CGI.pm in ikiwiki before 3.20160506 might allow remote attackers to inject arbitrary web script or HTML via unspecified vectors involving an error message.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
Date Public ?
2016-05-06 00:00
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T00:32:25.840Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://source.ikiwiki.branchable.com/?p=source.git%3Ba=commitdiff%3Bh=32ef584dc5abb6ddb9f794f94ea0b2934967bba7"
},
{
"name": "DSA-3571",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2016/dsa-3571"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://ikiwiki.info/security/#index43h2"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2016-05-06T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in the cgierror function in CGI.pm in ikiwiki before 3.20160506 might allow remote attackers to inject arbitrary web script or HTML via unspecified vectors involving an error message."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2016-05-10T18:57:01.000Z",
"orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5",
"shortName": "debian"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://source.ikiwiki.branchable.com/?p=source.git%3Ba=commitdiff%3Bh=32ef584dc5abb6ddb9f794f94ea0b2934967bba7"
},
{
"name": "DSA-3571",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2016/dsa-3571"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://ikiwiki.info/security/#index43h2"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@debian.org",
"ID": "CVE-2016-4561",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in the cgierror function in CGI.pm in ikiwiki before 3.20160506 might allow remote attackers to inject arbitrary web script or HTML via unspecified vectors involving an error message."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://source.ikiwiki.branchable.com/?p=source.git;a=commitdiff;h=32ef584dc5abb6ddb9f794f94ea0b2934967bba7",
"refsource": "CONFIRM",
"url": "http://source.ikiwiki.branchable.com/?p=source.git;a=commitdiff;h=32ef584dc5abb6ddb9f794f94ea0b2934967bba7"
},
{
"name": "DSA-3571",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3571"
},
{
"name": "http://ikiwiki.info/security/#index43h2",
"refsource": "CONFIRM",
"url": "http://ikiwiki.info/security/#index43h2"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5",
"assignerShortName": "debian",
"cveId": "CVE-2016-4561",
"datePublished": "2016-05-10T19:00:00.000Z",
"dateReserved": "2016-05-06T00:00:00.000Z",
"dateUpdated": "2024-08-06T00:32:25.840Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2016-4561\",\"sourceIdentifier\":\"security@debian.org\",\"published\":\"2016-05-10T19:59:04.307\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Cross-site scripting (XSS) vulnerability in the cgierror function in CGI.pm in ikiwiki before 3.20160506 might allow remote attackers to inject arbitrary web script or HTML via unspecified vectors involving an error message.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de XSS en la funci\u00f3n cgierror en CGI.pm en ikiwiki en versiones anteriores a 3.20160506 podr\u00eda permitir a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de vectores no especificados que implican un mensaje de error.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.7}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ikiwiki:ikiwiki:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.20160121\",\"matchCriteriaId\":\"8F8F89FC-3CF4-40DA-933B-4D0C3A1F2253\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]}],\"references\":[{\"url\":\"http://ikiwiki.info/security/#index43h2\",\"source\":\"security@debian.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://source.ikiwiki.branchable.com/?p=source.git%3Ba=commitdiff%3Bh=32ef584dc5abb6ddb9f794f94ea0b2934967bba7\",\"source\":\"security@debian.org\"},{\"url\":\"http://www.debian.org/security/2016/dsa-3571\",\"source\":\"security@debian.org\"},{\"url\":\"http://ikiwiki.info/security/#index43h2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://source.ikiwiki.branchable.com/?p=source.git%3Ba=commitdiff%3Bh=32ef584dc5abb6ddb9f794f94ea0b2934967bba7\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2016/dsa-3571\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
GHSA-VXG6-RR45-X5CV
Vulnerability from github – Published: 2022-05-17 03:55 – Updated: 2025-04-12 12:59
VLAI?
Details
Cross-site scripting (XSS) vulnerability in the cgierror function in CGI.pm in ikiwiki before 3.20160506 might allow remote attackers to inject arbitrary web script or HTML via unspecified vectors involving an error message.
Severity ?
6.1 (Medium)
{
"affected": [],
"aliases": [
"CVE-2016-4561"
],
"database_specific": {
"cwe_ids": [
"CWE-79"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2016-05-10T19:59:00Z",
"severity": "MODERATE"
},
"details": "Cross-site scripting (XSS) vulnerability in the cgierror function in CGI.pm in ikiwiki before 3.20160506 might allow remote attackers to inject arbitrary web script or HTML via unspecified vectors involving an error message.",
"id": "GHSA-vxg6-rr45-x5cv",
"modified": "2025-04-12T12:59:37Z",
"published": "2022-05-17T03:55:39Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4561"
},
{
"type": "WEB",
"url": "http://ikiwiki.info/security/#index43h2"
},
{
"type": "WEB",
"url": "http://source.ikiwiki.branchable.com/?p=source.git%3Ba=commitdiff%3Bh=32ef584dc5abb6ddb9f794f94ea0b2934967bba7"
},
{
"type": "WEB",
"url": "http://source.ikiwiki.branchable.com/?p=source.git;a=commitdiff;h=32ef584dc5abb6ddb9f794f94ea0b2934967bba7"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2016/dsa-3571"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
]
}
CNVD-2016-03223
Vulnerability from cnvd - Published: 2016-05-17
VLAI Severity ?
Title
ikiwiki跨站脚本漏洞(CNVD-2016-03223)
Description
Ikiwiki是一款wiki编译器,它支持将wiki页面转换为网站发布的HTML页面。
Ikiwiki的CGI.pm文件中的‘cgierror’函数存在跨站脚本漏洞,允许远程攻击者利用漏洞注入恶意脚本或HTML代码,当恶意数据被查看时,可获取敏感信息或劫持用户会话。
Severity
中
Patch Name
ikiwiki跨站脚本漏洞(CNVD-2016-03223)的补丁
Patch Description
Ikiwiki是一款wiki编译器,它支持将wiki页面转换为网站发布的HTML页面。
Ikiwiki的CGI.pm文件中的‘cgierror’函数存在跨站脚本漏洞,允许远程攻击者利用漏洞注入恶意脚本或HTML代码,当恶意数据被查看时,可获取敏感信息或劫持用户会话。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
用户可参考如下厂商提供的安全公告获取补丁以修复该漏洞: http://source.ikiwiki.branchable.com/?p=source.git;a=commitdiff;h=32ef584dc5abb6ddb9f794f94ea0b2934967bba7
Reference
http://source.ikiwiki.branchable.com/?p=source.git;a=commitdiff;h=32ef584dc5abb6ddb9f794f94ea0b2934967bba7
Impacted products
| Name | Ikiwiki Ikiwiki <3.20160506 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2016-4561"
}
},
"description": "Ikiwiki\u662f\u4e00\u6b3ewiki\u7f16\u8bd1\u5668\uff0c\u5b83\u652f\u6301\u5c06wiki\u9875\u9762\u8f6c\u6362\u4e3a\u7f51\u7ad9\u53d1\u5e03\u7684HTML\u9875\u9762\u3002\r\n\r\nIkiwiki\u7684CGI.pm\u6587\u4ef6\u4e2d\u7684\u2018cgierror\u2019\u51fd\u6570\u5b58\u5728\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\uff0c\u5141\u8bb8\u8fdc\u7a0b\u653b\u51fb\u8005\u5229\u7528\u6f0f\u6d1e\u6ce8\u5165\u6076\u610f\u811a\u672c\u6216HTML\u4ee3\u7801\uff0c\u5f53\u6076\u610f\u6570\u636e\u88ab\u67e5\u770b\u65f6\uff0c\u53ef\u83b7\u53d6\u654f\u611f\u4fe1\u606f\u6216\u52ab\u6301\u7528\u6237\u4f1a\u8bdd\u3002",
"discovererName": "Simon McVittie",
"formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u5382\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u516c\u544a\u83b7\u53d6\u8865\u4e01\u4ee5\u4fee\u590d\u8be5\u6f0f\u6d1e\uff1a\r\nhttp://source.ikiwiki.branchable.com/?p=source.git;a=commitdiff;h=32ef584dc5abb6ddb9f794f94ea0b2934967bba7",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2016-03223",
"openTime": "2016-05-17",
"patchDescription": "Ikiwiki\u662f\u4e00\u6b3ewiki\u7f16\u8bd1\u5668\uff0c\u5b83\u652f\u6301\u5c06wiki\u9875\u9762\u8f6c\u6362\u4e3a\u7f51\u7ad9\u53d1\u5e03\u7684HTML\u9875\u9762\u3002\r\n\r\nIkiwiki\u7684CGI.pm\u6587\u4ef6\u4e2d\u7684\u2018cgierror\u2019\u51fd\u6570\u5b58\u5728\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\uff0c\u5141\u8bb8\u8fdc\u7a0b\u653b\u51fb\u8005\u5229\u7528\u6f0f\u6d1e\u6ce8\u5165\u6076\u610f\u811a\u672c\u6216HTML\u4ee3\u7801\uff0c\u5f53\u6076\u610f\u6570\u636e\u88ab\u67e5\u770b\u65f6\uff0c\u53ef\u83b7\u53d6\u654f\u611f\u4fe1\u606f\u6216\u52ab\u6301\u7528\u6237\u4f1a\u8bdd\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "ikiwiki\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\uff08CNVD-2016-03223\uff09\u7684\u8865\u4e01",
"products": {
"product": "Ikiwiki Ikiwiki \u003c3.20160506"
},
"referenceLink": "http://source.ikiwiki.branchable.com/?p=source.git;a=commitdiff;h=32ef584dc5abb6ddb9f794f94ea0b2934967bba7",
"serverity": "\u4e2d",
"submitTime": "2016-05-12",
"title": "ikiwiki\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\uff08CNVD-2016-03223\uff09"
}
GSD-2016-4561
Vulnerability from gsd - Updated: 2023-12-13 01:21Details
Cross-site scripting (XSS) vulnerability in the cgierror function in CGI.pm in ikiwiki before 3.20160506 might allow remote attackers to inject arbitrary web script or HTML via unspecified vectors involving an error message.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2016-4561",
"description": "Cross-site scripting (XSS) vulnerability in the cgierror function in CGI.pm in ikiwiki before 3.20160506 might allow remote attackers to inject arbitrary web script or HTML via unspecified vectors involving an error message.",
"id": "GSD-2016-4561",
"references": [
"https://www.suse.com/security/cve/CVE-2016-4561.html",
"https://www.debian.org/security/2016/dsa-3571",
"https://advisories.mageia.org/CVE-2016-4561.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2016-4561"
],
"details": "Cross-site scripting (XSS) vulnerability in the cgierror function in CGI.pm in ikiwiki before 3.20160506 might allow remote attackers to inject arbitrary web script or HTML via unspecified vectors involving an error message.",
"id": "GSD-2016-4561",
"modified": "2023-12-13T01:21:18.442565Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security@debian.org",
"ID": "CVE-2016-4561",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cross-site scripting (XSS) vulnerability in the cgierror function in CGI.pm in ikiwiki before 3.20160506 might allow remote attackers to inject arbitrary web script or HTML via unspecified vectors involving an error message."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://source.ikiwiki.branchable.com/?p=source.git;a=commitdiff;h=32ef584dc5abb6ddb9f794f94ea0b2934967bba7",
"refsource": "CONFIRM",
"url": "http://source.ikiwiki.branchable.com/?p=source.git;a=commitdiff;h=32ef584dc5abb6ddb9f794f94ea0b2934967bba7"
},
{
"name": "DSA-3571",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3571"
},
{
"name": "http://ikiwiki.info/security/#index43h2",
"refsource": "CONFIRM",
"url": "http://ikiwiki.info/security/#index43h2"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:ikiwiki:ikiwiki:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.20160121",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security@debian.org",
"ID": "CVE-2016-4561"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in the cgierror function in CGI.pm in ikiwiki before 3.20160506 might allow remote attackers to inject arbitrary web script or HTML via unspecified vectors involving an error message."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://ikiwiki.info/security/#index43h2",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "http://ikiwiki.info/security/#index43h2"
},
{
"name": "http://source.ikiwiki.branchable.com/?p=source.git;a=commitdiff;h=32ef584dc5abb6ddb9f794f94ea0b2934967bba7",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "http://source.ikiwiki.branchable.com/?p=source.git;a=commitdiff;h=32ef584dc5abb6ddb9f794f94ea0b2934967bba7"
},
{
"name": "DSA-3571",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2016/dsa-3571"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
},
"lastModifiedDate": "2016-05-16T13:59Z",
"publishedDate": "2016-05-10T19:59Z"
}
}
}
OPENSUSE-SU-2024:10860-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Summary
ikiwiki-3.20200202.3-2.7 on GA media
Severity
Moderate
Notes
Title of the patch: ikiwiki-3.20200202.3-2.7 on GA media
Description of the patch: These are all security issues fixed in the ikiwiki-3.20200202.3-2.7 package on the GA media of openSUSE Tumbleweed.
Patchnames: openSUSE-Tumbleweed-2024-10860
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.7 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.4 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "ikiwiki-3.20200202.3-2.7 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the ikiwiki-3.20200202.3-2.7 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10860",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10860-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2008-0169 page",
"url": "https://www.suse.com/security/cve/CVE-2008-0169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-2944 page",
"url": "https://www.suse.com/security/cve/CVE-2009-2944/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-0428 page",
"url": "https://www.suse.com/security/cve/CVE-2011-0428/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-1401 page",
"url": "https://www.suse.com/security/cve/CVE-2011-1401/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-0220 page",
"url": "https://www.suse.com/security/cve/CVE-2012-0220/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-1572 page",
"url": "https://www.suse.com/security/cve/CVE-2014-1572/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-10026 page",
"url": "https://www.suse.com/security/cve/CVE-2016-10026/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1238 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1238/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-3714 page",
"url": "https://www.suse.com/security/cve/CVE-2016-3714/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4561 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4561/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9645 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9645/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9646 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9646/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-0356 page",
"url": "https://www.suse.com/security/cve/CVE-2017-0356/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9187 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9187/"
}
],
"title": "ikiwiki-3.20200202.3-2.7 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10860-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "ikiwiki-3.20200202.3-2.7.aarch64",
"product": {
"name": "ikiwiki-3.20200202.3-2.7.aarch64",
"product_id": "ikiwiki-3.20200202.3-2.7.aarch64"
}
},
{
"category": "product_version",
"name": "ikiwiki-w3m-3.20200202.3-2.7.aarch64",
"product": {
"name": "ikiwiki-w3m-3.20200202.3-2.7.aarch64",
"product_id": "ikiwiki-w3m-3.20200202.3-2.7.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ikiwiki-3.20200202.3-2.7.ppc64le",
"product": {
"name": "ikiwiki-3.20200202.3-2.7.ppc64le",
"product_id": "ikiwiki-3.20200202.3-2.7.ppc64le"
}
},
{
"category": "product_version",
"name": "ikiwiki-w3m-3.20200202.3-2.7.ppc64le",
"product": {
"name": "ikiwiki-w3m-3.20200202.3-2.7.ppc64le",
"product_id": "ikiwiki-w3m-3.20200202.3-2.7.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ikiwiki-3.20200202.3-2.7.s390x",
"product": {
"name": "ikiwiki-3.20200202.3-2.7.s390x",
"product_id": "ikiwiki-3.20200202.3-2.7.s390x"
}
},
{
"category": "product_version",
"name": "ikiwiki-w3m-3.20200202.3-2.7.s390x",
"product": {
"name": "ikiwiki-w3m-3.20200202.3-2.7.s390x",
"product_id": "ikiwiki-w3m-3.20200202.3-2.7.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ikiwiki-3.20200202.3-2.7.x86_64",
"product": {
"name": "ikiwiki-3.20200202.3-2.7.x86_64",
"product_id": "ikiwiki-3.20200202.3-2.7.x86_64"
}
},
{
"category": "product_version",
"name": "ikiwiki-w3m-3.20200202.3-2.7.x86_64",
"product": {
"name": "ikiwiki-w3m-3.20200202.3-2.7.x86_64",
"product_id": "ikiwiki-w3m-3.20200202.3-2.7.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ikiwiki-3.20200202.3-2.7.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.aarch64"
},
"product_reference": "ikiwiki-3.20200202.3-2.7.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ikiwiki-3.20200202.3-2.7.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.ppc64le"
},
"product_reference": "ikiwiki-3.20200202.3-2.7.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ikiwiki-3.20200202.3-2.7.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.s390x"
},
"product_reference": "ikiwiki-3.20200202.3-2.7.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ikiwiki-3.20200202.3-2.7.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.x86_64"
},
"product_reference": "ikiwiki-3.20200202.3-2.7.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ikiwiki-w3m-3.20200202.3-2.7.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.aarch64"
},
"product_reference": "ikiwiki-w3m-3.20200202.3-2.7.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ikiwiki-w3m-3.20200202.3-2.7.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.ppc64le"
},
"product_reference": "ikiwiki-w3m-3.20200202.3-2.7.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ikiwiki-w3m-3.20200202.3-2.7.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.s390x"
},
"product_reference": "ikiwiki-w3m-3.20200202.3-2.7.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ikiwiki-w3m-3.20200202.3-2.7.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.x86_64"
},
"product_reference": "ikiwiki-w3m-3.20200202.3-2.7.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2008-0169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2008-0169"
}
],
"notes": [
{
"category": "general",
"text": "Plugin/passwordauth.pm (aka the passwordauth plugin) in ikiwiki 1.34 through 2.47 allows remote attackers to bypass authentication, and login to any account for which an OpenID identity is configured and a password is not configured, by specifying an empty password during the login sequence.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.x86_64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2008-0169",
"url": "https://www.suse.com/security/cve/CVE-2008-0169"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.x86_64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2008-0169"
},
{
"cve": "CVE-2009-2944",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2009-2944"
}
],
"notes": [
{
"category": "general",
"text": "Incomplete blacklist vulnerability in the teximg plugin in ikiwiki before 3.1415926 and 2.x before 2.53.4 allows context-dependent attackers to read arbitrary files via crafted TeX commands.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.x86_64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2009-2944",
"url": "https://www.suse.com/security/cve/CVE-2009-2944"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.x86_64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2009-2944"
},
{
"cve": "CVE-2011-0428",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-0428"
}
],
"notes": [
{
"category": "general",
"text": "Cross Site Scripting (XSS) in ikiwiki before 3.20110122 could allow remote attackers to insert arbitrary JavaScript due to insufficient checking in comments.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.x86_64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-0428",
"url": "https://www.suse.com/security/cve/CVE-2011-0428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.x86_64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2011-0428"
},
{
"cve": "CVE-2011-1401",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-1401"
}
],
"notes": [
{
"category": "general",
"text": "ikiwiki before 3.20110328 does not ascertain whether the htmlscrubber plugin is enabled during processing of the \"meta stylesheet\" directive, which allows remote authenticated users to conduct cross-site scripting (XSS) attacks via crafted Cascading Style Sheets (CSS) token sequences in (1) the default stylesheet or (2) an alternate stylesheet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.x86_64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-1401",
"url": "https://www.suse.com/security/cve/CVE-2011-1401"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.x86_64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2011-1401"
},
{
"cve": "CVE-2012-0220",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-0220"
}
],
"notes": [
{
"category": "general",
"text": "Multiple cross-site scripting (XSS) vulnerabilities in the meta plugin (Plugin/meta.pm) in ikiwiki before 3.20120516 allow remote attackers to inject arbitrary web script or HTML via the (1) author or (2) authorurl meta tags.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.x86_64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-0220",
"url": "https://www.suse.com/security/cve/CVE-2012-0220"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.x86_64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2012-0220"
},
{
"cve": "CVE-2014-1572",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-1572"
}
],
"notes": [
{
"category": "general",
"text": "The confirm_create_account function in the account-creation feature in token.cgi in Bugzilla 2.x through 4.0.x before 4.0.15, 4.1.x and 4.2.x before 4.2.11, 4.3.x and 4.4.x before 4.4.6, and 4.5.x before 4.5.6 does not specify a scalar context for the realname parameter, which allows remote attackers to create accounts with unverified e-mail addresses by sending three realname values with realname=login_name as the second, as demonstrated by selecting an e-mail address with a domain name for which group privileges are automatically granted.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.x86_64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-1572",
"url": "https://www.suse.com/security/cve/CVE-2014-1572"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.x86_64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-1572"
},
{
"cve": "CVE-2016-10026",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-10026"
}
],
"notes": [
{
"category": "general",
"text": "ikiwiki 3.20161219 does not properly check if a revision changes the access permissions for a page on sites with the git and recentchanges plugins and the CGI interface enabled, which allows remote attackers to revert certain changes by leveraging permissions to change the page before the revision was made.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.x86_64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-10026",
"url": "https://www.suse.com/security/cve/CVE-2016-10026"
},
{
"category": "external",
"summary": "SUSE Bug 1016606 for CVE-2016-10026",
"url": "https://bugzilla.suse.com/1016606"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.x86_64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.x86_64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2016-10026"
},
{
"cve": "CVE-2016-1238",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1238"
}
],
"notes": [
{
"category": "general",
"text": "(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.x86_64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1238",
"url": "https://www.suse.com/security/cve/CVE-2016-1238"
},
{
"category": "external",
"summary": "SUSE Bug 1108749 for CVE-2016-1238",
"url": "https://bugzilla.suse.com/1108749"
},
{
"category": "external",
"summary": "SUSE Bug 1123389 for CVE-2016-1238",
"url": "https://bugzilla.suse.com/1123389"
},
{
"category": "external",
"summary": "SUSE Bug 987887 for CVE-2016-1238",
"url": "https://bugzilla.suse.com/987887"
},
{
"category": "external",
"summary": "SUSE Bug 988311 for CVE-2016-1238",
"url": "https://bugzilla.suse.com/988311"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.x86_64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.x86_64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-1238"
},
{
"cve": "CVE-2016-3714",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-3714"
}
],
"notes": [
{
"category": "general",
"text": "The (1) EPHEMERAL, (2) HTTPS, (3) MVG, (4) MSL, (5) TEXT, (6) SHOW, (7) WIN, and (8) PLT coders in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allow remote attackers to execute arbitrary code via shell metacharacters in a crafted image, aka \"ImageTragick.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.x86_64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-3714",
"url": "https://www.suse.com/security/cve/CVE-2016-3714"
},
{
"category": "external",
"summary": "SUSE Bug 1000484 for CVE-2016-3714",
"url": "https://bugzilla.suse.com/1000484"
},
{
"category": "external",
"summary": "SUSE Bug 1057163 for CVE-2016-3714",
"url": "https://bugzilla.suse.com/1057163"
},
{
"category": "external",
"summary": "SUSE Bug 1105592 for CVE-2016-3714",
"url": "https://bugzilla.suse.com/1105592"
},
{
"category": "external",
"summary": "SUSE Bug 978061 for CVE-2016-3714",
"url": "https://bugzilla.suse.com/978061"
},
{
"category": "external",
"summary": "SUSE Bug 980401 for CVE-2016-3714",
"url": "https://bugzilla.suse.com/980401"
},
{
"category": "external",
"summary": "SUSE Bug 982178 for CVE-2016-3714",
"url": "https://bugzilla.suse.com/982178"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.x86_64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.x86_64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2016-3714"
},
{
"cve": "CVE-2016-4561",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4561"
}
],
"notes": [
{
"category": "general",
"text": "Cross-site scripting (XSS) vulnerability in the cgierror function in CGI.pm in ikiwiki before 3.20160506 might allow remote attackers to inject arbitrary web script or HTML via unspecified vectors involving an error message.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.x86_64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4561",
"url": "https://www.suse.com/security/cve/CVE-2016-4561"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.x86_64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.x86_64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-4561"
},
{
"cve": "CVE-2016-9645",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9645"
}
],
"notes": [
{
"category": "general",
"text": "The fix for ikiwiki for CVE-2016-10026 was incomplete resulting in editing restriction bypass for git revert when using git versions older than 2.8.0. This has been fixed in 3.20161229.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.x86_64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9645",
"url": "https://www.suse.com/security/cve/CVE-2016-9645"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.x86_64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.x86_64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-9645"
},
{
"cve": "CVE-2016-9646",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9646"
}
],
"notes": [
{
"category": "general",
"text": "ikiwiki before 3.20161229 incorrectly called the CGI::FormBuilder-\u003efield method (similar to the CGI-\u003eparam API that led to Bugzilla\u0027s CVE-2014-1572), which can be abused to lead to commit metadata forgery.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.x86_64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9646",
"url": "https://www.suse.com/security/cve/CVE-2016-9646"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.x86_64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.x86_64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-9646"
},
{
"cve": "CVE-2017-0356",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-0356"
}
],
"notes": [
{
"category": "general",
"text": "A flaw, similar to to CVE-2016-9646, exists in ikiwiki before 3.20170111, in the passwordauth plugin\u0027s use of CGI::FormBuilder, allowing an attacker to bypass authentication via repeated parameters.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.x86_64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-0356",
"url": "https://www.suse.com/security/cve/CVE-2017-0356"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.x86_64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.x86_64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-0356"
},
{
"cve": "CVE-2019-9187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9187"
}
],
"notes": [
{
"category": "general",
"text": "ikiwiki before 3.20170111.1 and 3.2018x and 3.2019x before 3.20190228 allows SSRF via the aggregate plugin. The impact also includes reading local files via file: URIs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.x86_64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9187",
"url": "https://www.suse.com/security/cve/CVE-2019-9187"
},
{
"category": "external",
"summary": "SUSE Bug 1128085 for CVE-2019-9187",
"url": "https://bugzilla.suse.com/1128085"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.x86_64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-3.20200202.3-2.7.x86_64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.aarch64",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.ppc64le",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.s390x",
"openSUSE Tumbleweed:ikiwiki-w3m-3.20200202.3-2.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9187"
}
]
}
FKIE_CVE-2016-4561
Vulnerability from fkie_nvd - Published: 2016-05-10 19:59 - Updated: 2025-04-12 10:46
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the cgierror function in CGI.pm in ikiwiki before 3.20160506 might allow remote attackers to inject arbitrary web script or HTML via unspecified vectors involving an error message.
References
| URL | Tags | ||
|---|---|---|---|
| security@debian.org | http://ikiwiki.info/security/#index43h2 | Vendor Advisory | |
| security@debian.org | http://source.ikiwiki.branchable.com/?p=source.git%3Ba=commitdiff%3Bh=32ef584dc5abb6ddb9f794f94ea0b2934967bba7 | ||
| security@debian.org | http://www.debian.org/security/2016/dsa-3571 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://ikiwiki.info/security/#index43h2 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://source.ikiwiki.branchable.com/?p=source.git%3Ba=commitdiff%3Bh=32ef584dc5abb6ddb9f794f94ea0b2934967bba7 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2016/dsa-3571 |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| ikiwiki | ikiwiki | * | |
| debian | debian_linux | 8.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ikiwiki:ikiwiki:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8F8F89FC-3CF4-40DA-933B-4D0C3A1F2253",
"versionEndIncluding": "3.20160121",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in the cgierror function in CGI.pm in ikiwiki before 3.20160506 might allow remote attackers to inject arbitrary web script or HTML via unspecified vectors involving an error message."
},
{
"lang": "es",
"value": "Vulnerabilidad de XSS en la funci\u00f3n cgierror en CGI.pm en ikiwiki en versiones anteriores a 3.20160506 podr\u00eda permitir a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de vectores no especificados que implican un mensaje de error."
}
],
"id": "CVE-2016-4561",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2016-05-10T19:59:04.307",
"references": [
{
"source": "security@debian.org",
"tags": [
"Vendor Advisory"
],
"url": "http://ikiwiki.info/security/#index43h2"
},
{
"source": "security@debian.org",
"url": "http://source.ikiwiki.branchable.com/?p=source.git%3Ba=commitdiff%3Bh=32ef584dc5abb6ddb9f794f94ea0b2934967bba7"
},
{
"source": "security@debian.org",
"url": "http://www.debian.org/security/2016/dsa-3571"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://ikiwiki.info/security/#index43h2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://source.ikiwiki.branchable.com/?p=source.git%3Ba=commitdiff%3Bh=32ef584dc5abb6ddb9f794f94ea0b2934967bba7"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2016/dsa-3571"
}
],
"sourceIdentifier": "security@debian.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Show additional events:
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…