| Name |
Description |
| CVE-2017-15214 |
Stored XSS vulnerability in Flyspray 1.0-rc4 before 1.0-rc6 allows an
authenticated user to inject JavaScript to gain administrator
privileges and also to execute JavaScript against other users
(including unauthenticated users), via the name, title, or id parameter
to plugins/dokuwiki/lib/plugins/changelinks/syntax.php.
|
| CVE-2017-12980 |
DokuWiki through 2017-02-19c has stored XSS when rendering a malicious
RSS or Atom feed, in /inc/parser/xhtml.php. An attacker can create or
edit a wiki that uses RSS or Atom data from an attacker-controlled
server to trigger JavaScript execution. The JavaScript can be in an
author field, as demonstrated by the dc:creator element.
|
| CVE-2017-12979 |
DokuWiki through 2017-02-19c has stored XSS when rendering a malicious
language name in a code element, in /inc/parser/xhtml.php. An attacker
can create or edit a wiki with this element to trigger JavaScript
execution.
|
| CVE-2017-12583 |
DokuWiki through 2017-02-19b has XSS in the at parameter (aka the
DATE_AT variable) to doku.php.
|
| CVE-2016-7965 |
DokuWiki 2016-06-26a and older uses $_SERVER[HTTP_HOST] instead of the
baseurl setting as part of the password-reset URL. This can lead to
phishing attacks. (A remote unauthenticated attacker can change the
URL's hostname via the HTTP Host header.) The vulnerability can be
triggered only if the Host header is not part of the web server routing
process (e.g., if several domains are served by the same web server).
|
| CVE-2016-7964 |
The sendRequest method in HTTPClient Class in file /inc/HTTPClient.php
in DokuWiki 2016-06-26a and older, when media file fetching is enabled,
has no way to restrict access to private networks. This allows users to
scan ports of internal networks via SSRF, such as 10.0.0.1/8,
172.16.0.0/12, and 192.168.0.0/16.
|
| CVE-2015-2172 |
DokuWiki before 2014-05-05d and before 2014-09-29c does not properly
check permissions for the ACL plugins, which allows remote
authenticated users to gain privileges and add or delete ACL rules via
a request to the XMLRPC API.
|
| CVE-2014-9253 |
The default file type whitelist configuration in conf/mime.conf in the
Media Manager in DokuWiki before 2014-09-29b allows remote attackers
to execute arbitrary web script or HTML by uploading an SWF file, then
accessing it via the media parameter to lib/exe/fetch.php.
|
| CVE-2014-8764 |
DokuWiki 2014-05-05a and earlier, when using Active Directory for LDAP
authentication, allows remote attackers to bypass authentication via a
user name and password starting with a null (\0) character, which
triggers an anonymous bind.
|
| CVE-2014-8763 |
DokuWiki before 2014-05-05b, when using Active Directory for LDAP
authentication, allows remote attackers to bypass authentication via a
password starting with a null (\0) character and a valid user name,
which triggers an unauthenticated bind.
|
| CVE-2014-8762 |
The ajax_mediadiff function in DokuWiki before 2014-05-05a allows
remote attackers to access arbitrary images via a crafted namespace in
the ns parameter.
|
| CVE-2014-8761 |
inc/template.php in DokuWiki before 2014-05-05a only checks for access
to the root namespace, which allows remote attackers to access
arbitrary images via a media file details ajax call.
|
| CVE-2012-3354 |
doku.php in DokuWiki, as used in Fedora 16, 17, and 18, when certain
PHP error levels are set, allows remote attackers to obtain sensitive
information via the prefix parameter, which reveals the installation
path in an error message.
|
| CVE-2012-2129 |
Cross-site scripting (XSS) vulnerability in doku.php in DokuWiki
2012-01-25 Angua allows remote attackers to inject arbitrary web
script or HTML via the target parameter in an edit action.
|
| CVE-2012-2128 |
** DISPUTED **
Cross-site request forgery (CSRF) vulnerability in doku.php in
DokuWiki 2012-01-25 Angua allows remote attackers to hijack the
authentication of administrators for requests that add arbitrary
users. NOTE: this issue has been disputed by the vendor, who states
that it is resultant from CVE-2012-2129: "the exploit code simply uses
the XSS hole to extract a valid CSRF token."
|
| CVE-2012-0283 |
Cross-site scripting (XSS) vulnerability in the tpl_mediaFileList
function in inc/template.php in DokuWiki before 2012-01-25b allows
remote attackers to inject arbitrary web script or HTML via the ns
parameter in a medialist action to lib/exe/ajax.php.
|
| CVE-2011-3727 |
DokuWiki 2009-12-25c allows remote attackers to obtain sensitive
information via a direct request to a .php file, which reveals the
installation path in an error message, as demonstrated by
lib/tpl/index.php and certain other files.
|
| CVE-2011-2510 |
Cross-site scripting (XSS) vulnerability in the RSS embedding feature
in DokuWiki before 2011-05-25a Rincewind allows remote attackers to
inject arbitrary web script or HTML via a link.
|
| CVE-2010-0289 |
Multiple cross-site request forgery (CSRF) vulnerabilities in the ACL
Manager plugin (plugins/acl/ajax.php) in DokuWiki before 2009-12-25c
allow remote attackers to hijack the authentication of administrators
for requests that modify access control rules, and other unspecified
requests, via unknown vectors.
|
| CVE-2010-0288 |
A typo in the administrator permission check in the ACL Manager plugin
(plugins/acl/ajax.php) in DokuWiki before 2009-12-25b allows remote
attackers to gain privileges and access closed wikis by editing
current ACL statements, as demonstrated in the wild in January 2010.
|
| CVE-2010-0287 |
Directory traversal vulnerability in the ACL Manager plugin
(plugins/acl/ajax.php) in DokuWiki before 2009-12-25b allows remote
attackers to list the contents of arbitrary directories via a .. (dot
dot) in the ns parameter.
|
| CVE-2009-1960 |
inc/init.php in DokuWiki 2009-02-14, rc2009-02-06, and rc2009-01-30,
when register_globals is enabled, allows remote attackers to include
and execute arbitrary local files via the
config_cascade[main][default][] parameter to doku.php. NOTE: PHP
remote file inclusion is also possible in PHP 5 using ftp:// URLs.
|
| CVE-2007-3930 |
Interpretation conflict between Microsoft Internet Explorer and
DocuWiki before 2007-06-26b allows remote attackers to inject
arbitrary JavaScript and conduct cross-site scripting (XSS) attacks
when spellchecking UTF-8 encoded messages via the spell_utf8test
function in lib/exe/spellcheck.php, which triggers HTML document
identification and script execution by Internet Explorer even though
the Content-Type header is text/plain.
|
| CVE-2006-6965 |
CRLF injection vulnerability in lib/exe/fetch.php in DokuWiki
2006-03-09e, and possibly earlier, allows remote attackers to inject
arbitrary HTTP headers and conduct HTTP response splitting attacks via
CRLF sequences in the media parameter. NOTE: this issue can be
leveraged for XSS attacks.
|
| CVE-2006-5099 |
lib/exec/fetch.php in DokuWiki before 2006-03-09e, when
conf[imconvert] is configured to use ImageMagick, allows remote
attackers to execute arbitrary commands via shell metacharacters in
the (1) w and (2) h parameters, which are not filtered when invoking
convert.
|
| CVE-2006-5098 |
lib/exec/fetch.php in DokuWiki before 2006-03-09e allows remote
attackers to cause a denial of service (CPU consumption) via large w
and h parameters, when resizing an image.
|
| CVE-2006-4679 |
DokuWiki before 2006-03-09c enables the debug feature by default,
which allows remote attackers to obtain sensitive information by
calling doku.php with the X-DOKUWIKI-DO HTTP header set to "debug".
|
| CVE-2006-4675 |
Unrestricted file upload vulnerability in lib/exe/media.php in
DokuWiki before 2006-03-09c allows remote attackers to upload
executable files into the data/media folder via unspecified vectors.
|
| CVE-2006-4674 |
Direct static code injection vulnerability in doku.php in DokuWiki
before 2006-030-09c allows remote attackers to execute arbitrary PHP
code via the X-FORWARDED-FOR HTTP header, which is stored in
config.php.
|
| CVE-2006-2945 |
Unspecified vulnerability in the user profile change functionality in
DokuWiki, when Access Control Lists are enabled, allows remote
authenticated users to read unauthorized files via unknown attack
vectors.
|
| CVE-2006-2878 |
The spellchecker (spellcheck.php) in DokuWiki 2006/06/04 and earlier
allows remote attackers to insert and execute arbitrary PHP code via
"complex curly syntax" that is inserted into a regular expression that
is processed by preg_replace with the /e (executable) modifier.
|
| CVE-2006-1165 |
Cross-site scripting (XSS) vulnerability in the mediamanager module in
DokuWiki before 2006-03-05 allows remote attackers to inject arbitrary
web script or HTML via unknown attack vectors relating to "handling
EXIF data."
|
| CVE-2004-2560 |
DokuWiki before 2004-10-19, when used on a web server that permits
execution based on file extension, allows remote attackers to execute
arbitrary code by uploading a file with an appropriate extension such
as ".php" or ".cgi".
|
| CVE-2004-2559 |
DokuWiki before 2004-10-19 allows remote attackers to access
administrative functionality including (1) Mediaselectiondialog, (2)
Recent changes, (3) feed, and (4) search, possibly due to the lack of
ACL checks.
|