Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability via IMG element in Tiki before 16.3, 17.x before 17.1, 12 LTS before 12.12 LTS, and 15 LTS before 15.5 LTS allows an authenticated user to gain administrator privileges if an administrator opens a wiki page with an IMG element, related to tiki-assignuser.php.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tiki | Tikiwiki Cms\/Groupware | 12.0 |
Related Weaknesses (CWE)
References
- http://openwall.com/lists/oss-security/2017/09/28/13Mailing ListThird Party Advisory
- https://sourceforge.net/p/tikiwiki/code/63829PatchThird Party Advisory
- https://tiki.org/article449-Security-and-bug-fix-updates-Tiki-17-1-Tiki-16-3-15-PatchRelease NotesVendor Advisory
- http://openwall.com/lists/oss-security/2017/09/28/13Mailing ListThird Party Advisory
- https://sourceforge.net/p/tikiwiki/code/63829PatchThird Party Advisory
- https://tiki.org/article449-Security-and-bug-fix-updates-Tiki-17-1-Tiki-16-3-15-PatchRelease NotesVendor Advisory
FAQ
What is CVE-2017-14924?
CVE-2017-14924 is a vulnerability with a CVSS score of 8.0 (HIGH). Cross-Site Request Forgery (CSRF) vulnerability via IMG element in Tiki before 16.3, 17.x before 17.1, 12 LTS before 12.12 LTS, and 15 LTS before 15.5 LTS allows an authenticated user to gain administ...
How severe is CVE-2017-14924?
CVE-2017-14924 has been rated HIGH with a CVSS base score of 8.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-14924?
Check the references section above for vendor advisories and patch information. Affected products include: Tiki Tikiwiki Cms\/Groupware.