Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-29254 PoC — Tiki Wiki 跨站请求伪造漏洞

Source
Associated Vulnerability
Title:Tiki Wiki 跨站请求伪造漏洞 (CVE-2020-29254)
Description:Tiki Wiki是Tiki社区的一款基于Php的Wiki系统。 Tiki Wiki 21.2存在安全漏洞,该漏洞允许在没有CSRF保护的情况下编辑模板。这可能允许未经身份验证的远程攻击者可利用该漏洞执行跨站点请求伪造(CSRF)攻击,并在受影响的系统上执行任意操作。该漏洞是由于受影响系统的基于web的管理界面的CSRF保护不足。攻击者可利用该漏洞可以通过说服界面的用户遵循恶意设计的链接来利用这个漏洞。成功的利用可以允许攻击者可利用该漏洞利用用户的特权在受影响的系统上执行任意操作。
Description
TikiWiki 21.2 allows to edit templates without the use of a CSRF protection. 
Readme
# CVE-2020-29254
TikiWiki 21.2 allows to edit templates without the use of a CSRF protection. 

==========================

Cross-Side-Request-Forgery (CSRF):

TikiWiki 21.2 allows to edit templates without the use of a CSRF protection. 
This could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on an affected system. The vulnerability is due to insufficient CSRF protections for the web-based management interface of the affected system. An attacker could exploit this vulnerability by persuading a user to follow a maliciously crafted url. A successful exploit could allow the attacker to perform arbitrary actions on an affected system with the privileges of the user. These action include allowing attackers to submit their own code through an authenticated user resulting in e.g. path traversal. If an authenticated user who is able to edit TikiWiki templates visits an malicious website, template code can be edited.

### Can be combined with Path Traversal:
In TikiWiki 21.2, an user can be given the permission to edit .tpl templates. This
feature can be abused to escalate the users privileges by inserting the following piece
of smarty code: „{include file='../db/local.php'}“. The code snippet includes
TikiWikis database configuration file and displays it in the pages source code. Any
other www-data readable file like „/etc/passwd“ can be included as well. The config
file displays TikiWikis database credentials in cleartext.
Recommended solution: Disallow including filetypes other than .tpl


# A response from the Tiki project
https://doc.tiki.org/CVE-2020-29254
File Snapshot

[4.0K] /data/pocs/573eaf8bee9f5ecc28b5c1f31152ea439e7b1791 └── [1.6K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.