An SQL injection vulnerability and multiple XSS vulnerabilities have been discovered.
|Package||www-apps/tikiwiki on all architectures|
|Affected versions||< 1.9.4|
|Unaffected versions||>= 1.9.4|
Tikiwiki is a web-based groupware and content management system (CMS), using PHP, ADOdb and Smarty.
Tikiwiki fails to properly sanitize user input before processing it, including in SQL statements.
An attacker could execute arbitrary SQL statements on the underlying database, or inject arbitrary scripts into the context of a user's browser.
There is no known workaround at this time.
All Tikiwiki users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=www-apps/tikiwiki-1.9.4"