Dokuwiki

Dokuwiki

28 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.51%
  • Veröffentlicht 21.08.2017 07:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

DokuWiki through 2017-02-19c has stored XSS when rendering a malicious RSS or Atom feed, in /inc/parser/xhtml.php. An attacker can create or edit a wiki that uses RSS or Atom data from an attacker-controlled server to trigger JavaScript execution. Th...

Exploit
  • EPSS 0.51%
  • Veröffentlicht 21.08.2017 07:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

DokuWiki through 2017-02-19c has stored XSS when rendering a malicious language name in a code element, in /inc/parser/xhtml.php. An attacker can create or edit a wiki with this element to trigger JavaScript execution.

Exploit
  • EPSS 1.33%
  • Veröffentlicht 06.08.2017 03:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

DokuWiki through 2017-02-19b has XSS in the at parameter (aka the DATE_AT variable) to doku.php.

Exploit
  • EPSS 0.41%
  • Veröffentlicht 31.10.2016 10:59:01
  • Zuletzt bearbeitet 06.05.2026 22:30:45

DokuWiki 2016-06-26a and older uses $_SERVER[HTTP_HOST] instead of the baseurl setting as part of the password-reset URL. This can lead to phishing attacks. (A remote unauthenticated attacker can change the URL's hostname via the HTTP Host header.) T...

  • EPSS 0.33%
  • Veröffentlicht 31.10.2016 10:59:00
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The sendRequest method in HTTPClient Class in file /inc/HTTPClient.php in DokuWiki 2016-06-26a and older, when media file fetching is enabled, has no way to restrict access to private networks. This allows users to scan ports of internal networks via...

  • EPSS 1.76%
  • Veröffentlicht 30.03.2015 14:59:07
  • Zuletzt bearbeitet 06.05.2026 22:30:45

DokuWiki before 2014-05-05d and before 2014-09-29c does not properly check permissions for the ACL plugins, which allows remote authenticated users to gain privileges and add or delete ACL rules via a request to the XMLRPC API.

  • EPSS 0.59%
  • Veröffentlicht 17.12.2014 18:59:02
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The default file type whitelist configuration in conf/mime.conf in the Media Manager in DokuWiki before 2014-09-29b allows remote attackers to execute arbitrary web script or HTML by uploading an SWF file, then accessing it via the media parameter to...

  • EPSS 1.22%
  • Veröffentlicht 22.10.2014 14:55:08
  • Zuletzt bearbeitet 06.05.2026 22:30:45

DokuWiki 2014-05-05a and earlier, when using Active Directory for LDAP authentication, allows remote attackers to bypass authentication via a user name and password starting with a null (\0) character, which triggers an anonymous bind.

  • EPSS 1.05%
  • Veröffentlicht 22.10.2014 14:55:08
  • Zuletzt bearbeitet 06.05.2026 22:30:45

DokuWiki before 2014-05-05b, when using Active Directory for LDAP authentication, allows remote attackers to bypass authentication via a password starting with a null (\0) character and a valid user name, which triggers an unauthenticated bind.

  • EPSS 0.6%
  • Veröffentlicht 22.10.2014 14:55:08
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The ajax_mediadiff function in DokuWiki before 2014-05-05a allows remote attackers to access arbitrary images via a crafted namespace in the ns parameter.