• Register
    • Help

    striker  0 Items
    Currently Supporting
    • Home
    • News
    • Forum
    • Wiki
    • Support
    • What's New?
    • Buy Now
    • Manual
      • Install/Upgrade
      • Admin Manual
      • User Manual
      • Style/Phrase Changes
      • Changelog
      • Security Issues
    • 
    • Wiki
    • Book
    • Documentation
    • VWE-2010-0136

    1. Welcome to VaultWiki.org, home of the wiki add-on for vBulletin and XenForo!

      VaultWiki allows your existing forum users to collaborate on creating and managing a site's content pages. VaultWiki is a fully-featured and fully-supported wiki solution for vBulletin and XenForo.

      The VaultWiki Team encourages you to join our community of forum administrators and check out VaultWiki for yourself.

    • Category
    • View
      • List of Sub-Categories in This Category
      • List of Pages in This Category
    • English (US)

    VWE-2010-0136

    This page is a chapter in Info Known Vulnerabilities
    Common NameNone
    VWE-IDVWE-2010-0136
    Related Report#2157
    SeverityMEDIUM
    Exploit DifficultyNORMAL
    PlatformAffects all platforms supported by the vulnerable versions.
    DescriptionPermissions escalation. A user can remove attachments from wiki content they do not have permission to edit, as long as the attachment was originally uploaded by them, and as long as they have permission to edit and change attachments for other wiki content.
    DiscoveredDecember 13, 2010
    ResolvedDecember 17, 2010
    Patches Available3.0.8
    The versions listed below are known to be affected by this issue. If you are using one of those versions, you should update to a newer release that has no known vulnerabilities.

    Notes

    After some brief deliberation, this permissions escalation was incorrectly handled as a standard bug at the time it was patched. As a result, patches of other issues for earlier versions in the 3.x series continued to have this issue, even though they were released after this issue was patched.
    Info Known Vulnerabilities
    VWE-2010-0077 
    VWE-2010-0144 

    This page has been seen 5,022 times.

      • Created by
        pegasus
        • View Public Profile
        • Show contributions to this page
        • Send a private message to pegasus
        • Visit pegasus's homepage!
        on November 24, 2024

    Sub-Categories of VWE-2010-0136

    1. #

      1. XSS 2.0.0 Beta 1

      2. XSS 2.0.0 Beta 2

      3. XSS 2.0.0 Beta 3

      4. XSS 2.0.0 RC 1 Patch Level 1

      5. XSS 2.0.0 RC 1

      6. XSS 2.0.0 RC 2

      7. XSS 2.0.0 RC 3

      8. XSS 2.0.0

      9. XSS 2.0.1

      10. XSS 2.0.2

      11. XSS 2.0.3

      12. XSS 2.0.4

      13. XSS 2.1.0

      14. XSS 2.1.1

      15. XSS 2.1.2

      16. XSS 2.1.3

      17. XSS 2.2.0

      18. XSS 2.2.1 Patch Level 1

      19. XSS 2.2.1

      20. XSS 2.2.2

      21. XSS 2.2.3 Patch Level 1

    2. # (cont.)

      1. XSS 2.2.3

      2. XSS 2.3.0 Patch Level 1

      3. XSS 2.3.0

      4. XSS 2.3.1

      5. XSS 2.3.2

      6. XSS 2.5.0

      7. XSS 2.5.1

      8. XSS 2.5.2

      9. XSS 2.5.3

      10. XSS 2.5.4

      11. XSS 2.5.5

      12. XSS 2.5.6

      13. XSS 2.5.7 Patch Level 1

      14. XSS 2.5.7 Patch Level 2

      15. XSS 2.5.7 Patch Level 3

      16. XSS 2.5.7 Patch Level 4

      17. XSS 2.5.7

      18. XSS 3.0.0 Beta 1

      19. XSS 3.0.0 Beta 2

      20. XSS 3.0.0 Beta 3

      21. XSS 3.0.0 Beta 4

    3. # (cont.)

      1. XSS 3.0.0 Beta 5

      2. XSS 3.0.0 Beta 6

      3. XSS 3.0.0 RC 1

      4. XSS 3.0.0 RC 2

      5. XSS 3.0.0 RC 3

      6. XSS 3.0.0

      7. XSS 3.0.1 Patch Level 1

      8. XSS 3.0.1

      9. XSS 3.0.2 Patch Level 1

      10. XSS 3.0.2

      11. XSS 3.0.3 Patch Level 1

      12. XSS 3.0.3

      13. XSS 3.0.4 Patch Level 1

      14. XSS 3.0.4

      15. XSS 3.0.5 Patch Level 1

      16. XSS 3.0.5

      17. XSS 3.0.6 Patch Level 1

      18. XSS 3.0.6

      19. XSS 3.0.7 Patch Level 1

      20. XSS 3.0.7

    Users Browsing This Page (0 members, 1 guests)

    Search the Wiki

    Show results of these types:

    Share This Page

    Click a button below to activate it. Click again to share. Privacy Information Keep in mind that simply activating a button will reveal some of your browsing data with the selected third-party service in accordance with their own Terms of Service and/or Privacy Policy.
    Like0
    Link here from this web site
    Link here from the web
    Submit to Digg Digg
    Submit to del.icio.us del.icio.us
    Submit to StumbleUpon StumbleUpon
    Submit to Google Google

    Recent Activity

    Show results from
    Filters

    Info Known Vulnerabilities

    Book Table of Contents
    • 1VWE-2008-0004-1
    • 2VWE-2008-0004-2
    • 3VWE-2008-0006-1
    • 4VWE-2008-0006-2
    • 5VWE-2008-0006-3
    • 6VWE-2008-0006-4
    • 7VWE-2008-0016
    • 8VWE-2009-0034
    • 9VWE-2009-0046
    • 10VWE-2009-0047
    • 11VWE-2010-0070
    • 12VWE-2010-0094
    • 13VWE-2010-0096
    • 14VWE-2010-0072
    • 15VWE-2010-0102
    • 16VWE-2010-0103
    • 17VWE-2010-0106
    • 18VWE-2010-0110
    • 19VWE-2010-0075
    • 20VWE-2010-0000-1
    • 21VWE-2010-0074-2
    • 22VWE-2010-0074-1
    • 23VWE-2010-0122-1
    • 24VWE-2010-0122-2
    • 25VWE-2010-0122-3
    • 26VWE-2010-0076
    • 27VWE-2010-0077
    • 28VWE-2010-0136
    • 29VWE-2010-0144
    • 30VWE-2011-0101
    • 31VWE-2011-0186
    • 32VWE-2011-0100
    • 33VWE-2011-0148
    • 34VWE-2013-0228-1
    • 35VWE-2012-0205
    • 36VWE-2013-0228-2
    • 37VWE-2013-0228-3
    • 38VWE-2013-0228-4
    • 39VWE-2013-0010
    • 40VWE-2013-0012
    • 41VWE-2013-0038
    • 42VWE-2013-0039
    • 43VWE-2014-0070
    • 44VWE-2014-0086
    • 45VWE-2014-0112
    • 46VWE-2014-0232
    • 47VWE-2014-0338
    • 48VWE-2014-0383
    • 49VWE-2015-0843
    • 50VWE-2015-0870
    • 51VWE-2015-0896
    • 52VWE-2015-0908
    • 53VWE-2015-0973
    • 54VWE-2015-0974
    • 55VWE-2015-1005
    • 56VWE-2015-1012
    • 57VWE-2015-1014
    • 58VWE-2015-1015
    • 59VWE-2015-1024
    • 60VWE-2015-1032
    • 61VWE-2015-1040
    • 62VWE-2015-1112
    • 63VWE-2015-1166
    • 64VWE-2015-1178
    • 65VWE-2015-1601
    • 66VWE-2015-1618
    • 67VWE-2015-1636
    • 68VWE-2015-1766
    • 69VWE-2015-1778
    • 70VWE-2015-1812
    • 71VWE-2015-1840
    • 72VWE-2016-2034
    • 73VWE-2016-2039
    • 74VWE-2016-2072
    • 75VWE-2016-2047
    • 76VWE-2016-2064
    • 77VWE-2016-2081
    • 78VWE-2016-2370
    • 79VWE-2016-2706
    • 80VWE-2016-2738
    • 81VWE-2016-2889
    • 82VWE-2016-2890
    • 83VWE-2016-2905
    • 84VWE-2016-2906
    • 85VWE-2016-3063
    • 86VWE-2016-3080
    • 87VWE-2016-3087
    • 88VWE-2016-3104
    • 89VWE-2016-3112
    • 90VWE-2016-3120
    • 91VWE-2016-3128
    • 92VWE-2017-3388
    • 93VWE-2017-3396
    • 94VWE-2017-3407
    • 95VWE-2017-3415
    • 96VWE-2017-3428
    • 97VWE-2017-3436
    • 98VWE-2017-3437
    • 99VWE-2017-3445
    • 100VWE-2017-3677
    • 101VWE-2017-3679
    • 102VWE-2017-3682
    • 103VWE-2017-3683
    • 104VWE-2017-3684
    • 105VWE-2017-3686
    • 106VWE-2017-3687
    • 107VWE-2017-3733
    • 108VWE-2017-3734
    • 109VWE-2017-3857
    • 110VWE-2017-3858
    • 111VWE-2017-3978
    • 112VWE-2017-3979
    • 113VWE-2017-3981
    • 114VWE-2017-3992
    • 115VWE-2017-3999
    • 116VWE-2017-4004
    • 117VWE-2017-4012
    • 118VWE-2017-4030
    • 119VWE-2017-4031
    • 120VWE-2017-4032
    • 121VWE-2017-4033
    • 122VWE-2017-4073
    • 123VWE-2017-4075
    • 124VWE-2017-4131
    • 125VWE-2017-4138
    • 126VWE-2017-4152
    • 127VWE-2017-4153
    • 128VWE-2017-4265
    • 129VWE-2017-4266
    • 130VWE-2017-4267
    • 131VWE-2017-4275
    • 132VWE-2017-4282
    • 133VWE-2017-4287
    • 134VWE-2017-4317
    • 135VWE-2017-4318
    • 136VWE-2017-4319
    • 137VWE-2017-4320
    • 138VWE-2017-4325
    • 139VWE-2017-4326
    • 140VWE-2018-4336
    • 141VWE-2018-4337
    • 142VWE-2018-4345
    • 143VWE-2018-4346
    • 144VWE-2018-4347
    • 145VWE-2018-4348
    • 146VWE-2018-4350
    • 147VWE-2018-4352
    • 148VWE-2018-4356
    • 149VWE-2018-4394
    • 150VWE-2018-4471
    • 151VWE-2018-4485
    • 152VWE-2018-4535
    • 153VWE-2018-4536
    • 154VWE-2018-4573
    • 155VWE-2018-4574
    • 156VWE-2018-4610
    • 157VWE-2018-4614
    • 158VWE-2018-4618
    • 159VWE-2018-4620
    • 160VWE-2018-4625
    • 161VWE-2018-4626
    • 162VWE-2018-4627
    • 163VWE-2018-4630
    • 164VWE-2018-4631
    • 165VWE-2018-4632
    • 166VWE-2018-4662
    • 167VWE-2018-4666
    • 168VWE-2018-4667
    • 169VWE-2018-4670
    • 170VWE-2018-4671
    • 171VWE-2018-4673
    • 172VWE-2018-4972
    • 173VWE-2019-5016
    • 174VWE-2019-5150
    • 175VWE-2019-5151
    • 176VWE-2019-5157
    • 177VWE-2019-5159
    • 178VWE-2019-5160
    • 179VWE-2019-5161
    • 180VWE-2019-5162
    • 181VWE-2019-5163
    • 182VWE-2019-5171
    • 183VWE-2019-5172
    • 184VWE-2019-5181
    • 185VWE-2019-5188
    • 186VWE-2019-5189
    • 187VWE-2019-5193
    • 188VWE-2019-5241
    • 189VWE-2019-5244
    • 190VWE-2019-5261
    • 191VWE-2019-5266
    • 192VWE-2019-5268
    • 193VWE-2019-5275
    • 194VWE-2019-5280
    • 195VWE-2019-5360
    • 196VWE-2019-5361
    • 197VWE-2019-5363
    • 198VWE-2019-5375
    • 199VWE-2019-5391

    Legend

    • Category with listings
    Color code
    • Content has new updates
    • Content has no updates
    • Contact Us
    • License Agreement
    • Privacy
    • Terms
    • Top
    All times are GMT -4. The time now is 6:26 AM.
    This site uses cookies to help personalize content, to tailor your experience, and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Learn more… Accept Remind me later
  • striker
    Powered by vBulletin® Version 4.2.5 Beta 2
    Copyright © 2025 vBulletin Solutions Inc. All rights reserved.
    Search Engine Optimisation provided by DragonByte SEO (Pro) - vBulletin Mods & Addons Copyright © 2025 DragonByte Technologies Ltd.
    Copyright © 2008 - 2024 VaultWiki Team, Cracked Egg Studios, LLC.
    "Wiki" powered by VaultWiki v4.1.9.