header-logo
Suggest Exploit
vendor:
MoniWiki
by:
Unknown
5.5
CVSS
MEDIUM
Cross-Site Scripting (XSS)
79
CWE
Product Name: MoniWiki
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested: Unknown
Unknown

MoniWiki Cross-Site Scripting Vulnerability

MoniWiki is prone to a cross-site scripting vulnerability due to improper sanitization of user-supplied URI input. An attacker can create a malicious URI link containing hostile HTML and script code. When a victim user follows this link, the code may be executed in their browser, potentially allowing the attacker to steal authentication credentials or launch other attacks.

Mitigation:

It is recommended to update MoniWiki to the latest version or apply any relevant patches or fixes provided by the vendor. Additionally, input validation and sanitization should be implemented to prevent such vulnerabilities.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/11516/info

MoniWiki is reported prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied URI input before including it in dynamic web page content. 

This issue could permit a remote attacker to create a malicious URI link that includes hostile HTML and script code. If this link were to be followed, the hostile code may be rendered in the browser of the victim user. This would occur in the security context of the affected website and may allow the attacker to steal cookie-based authentication credentials or launch other attacks.

http://www.example.com/wiki.php/<script>alert("XSS Vulnerability exists")</script> http://www.example.com/wiki.php/".,script>alert(String.fromCharCode(88,83,83,32,53580,49828,53944))</script>