header-logo
Suggest Exploit
vendor:
Personal Wiki, Team Wiki
by:
Unknown
7.5
CVSS
HIGH
Cross-Site Scripting (XSS), Arbitrary File Upload, Information Disclosure
79 (XSS), 434 (File Upload), 200 (Information Disclosure)
CWE
Product Name: Personal Wiki, Team Wiki
Affected Version From: Personal Wiki 1.14, Team Wiki 1.14
Affected Version To: Unknown
Patch Exists: NO
Related CWE:
CPE: a:portili:personal_wiki:1.14, cpe:/a:portili:team_wiki:1.14
Metasploit:
Other Scripts:
Platforms Tested: Unknown
Unknown

Portili Personal and Team Wiki Multiple Vulnerabilities

Attackers can exploit these issues to obtain sensitive information, steal cookie-based authentication information, upload arbitrary files to the affected computer, and execute arbitrary script code in the context of the browser.

Mitigation:

Apply security patches or updates provided by the vendor. Avoid uploading files from untrusted sources. Regularly monitor the application for any suspicious activity.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/41973/info

Portili Personal and Team Wiki are prone to multiple security vulnerabilities. These vulnerabilities include a cross-site scripting vulnerability, an arbitrary-file-upload vulnerability, and multiple information-disclosure vulnerabilities.

Attackers can exploit these issues to obtain sensitive information, steal cookie-based authentication information, upload arbitrary files to the affected computer, and execute arbitrary script code in the context of the browser.

Personal Wiki 1.14 and Team Wiki 1.14 are vulnerable; other versions may also be affected. 

http://www.example.com/ajaxfilemanager/ajaxfilemanager.php?path=../uploads/&view=1<script>alert("abysssec")</script>