Dokuwiki

Dokuwiki

25 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.29%
  • Veröffentlicht 31.10.2016 10:59:01
  • Zuletzt bearbeitet 12.04.2025 10:46:40

DokuWiki 2016-06-26a and older uses $_SERVER[HTTP_HOST] instead of the baseurl setting as part of the password-reset URL. This can lead to phishing attacks. (A remote unauthenticated attacker can change the URL's hostname via the HTTP Host header.) T...

  • EPSS 0.56%
  • Veröffentlicht 31.10.2016 10:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The sendRequest method in HTTPClient Class in file /inc/HTTPClient.php in DokuWiki 2016-06-26a and older, when media file fetching is enabled, has no way to restrict access to private networks. This allows users to scan ports of internal networks via...

  • EPSS 1.76%
  • Veröffentlicht 30.03.2015 14:59:07
  • Zuletzt bearbeitet 12.04.2025 10:46:40

DokuWiki before 2014-05-05d and before 2014-09-29c does not properly check permissions for the ACL plugins, which allows remote authenticated users to gain privileges and add or delete ACL rules via a request to the XMLRPC API.

  • EPSS 0.59%
  • Veröffentlicht 17.12.2014 18:59:02
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The default file type whitelist configuration in conf/mime.conf in the Media Manager in DokuWiki before 2014-09-29b allows remote attackers to execute arbitrary web script or HTML by uploading an SWF file, then accessing it via the media parameter to...

  • EPSS 1.22%
  • Veröffentlicht 22.10.2014 14:55:08
  • Zuletzt bearbeitet 12.04.2025 10:46:40

DokuWiki 2014-05-05a and earlier, when using Active Directory for LDAP authentication, allows remote attackers to bypass authentication via a user name and password starting with a null (\0) character, which triggers an anonymous bind.

  • EPSS 1.05%
  • Veröffentlicht 22.10.2014 14:55:08
  • Zuletzt bearbeitet 12.04.2025 10:46:40

DokuWiki before 2014-05-05b, when using Active Directory for LDAP authentication, allows remote attackers to bypass authentication via a password starting with a null (\0) character and a valid user name, which triggers an unauthenticated bind.

  • EPSS 0.6%
  • Veröffentlicht 22.10.2014 14:55:08
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The ajax_mediadiff function in DokuWiki before 2014-05-05a allows remote attackers to access arbitrary images via a crafted namespace in the ns parameter.

  • EPSS 0.52%
  • Veröffentlicht 22.10.2014 14:55:08
  • Zuletzt bearbeitet 12.04.2025 10:46:40

inc/template.php in DokuWiki before 2014-05-05a only checks for access to the root namespace, which allows remote attackers to access arbitrary images via a media file details ajax call.

  • EPSS 0.55%
  • Veröffentlicht 20.11.2012 00:55:00
  • Zuletzt bearbeitet 11.04.2025 00:51:21

doku.php in DokuWiki, as used in Fedora 16, 17, and 18, when certain PHP error levels are set, allows remote attackers to obtain sensitive information via the prefix parameter, which reveals the installation path in an error message.

Exploit
  • EPSS 0.67%
  • Veröffentlicht 23.09.2011 23:55:03
  • Zuletzt bearbeitet 11.04.2025 00:51:21

DokuWiki 2009-12-25c allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by lib/tpl/index.php and certain other files.