Executive Summary
Summary | |
---|---|
Title | DokuWiki: Multiple vulnerabilities |
Informations | |||
---|---|---|---|
Name | GLSA-201301-07 | First vendor Publication | 2013-01-09 |
Vendor | Gentoo | Last vendor Modification | 2013-01-09 |
Severity (Vendor) | Normal | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Synopsis Multiple vulnerabilities were found in DokuWiki, the worst of which leading to privilege escalation. Background Description Impact Workaround Resolution References Availability http://security.gentoo.org/glsa/glsa-201301-07.xml |
Original Source
Url : http://security.gentoo.org/glsa/glsa-201301-07.xml |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
33 % | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25) |
17 % | CWE-352 | Cross-Site Request Forgery (CSRF) (CWE/SANS Top 25) |
17 % | CWE-264 | Permissions, Privileges, and Access Controls |
17 % | CWE-200 | Information Exposure |
17 % | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE/SANS Top 25) |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:15193 | |||
Oval ID: | oval:org.mitre.oval:def:15193 | ||
Title: | DSA-2320-1 dokuwiki -- regression fix | ||
Description: | The dokuwiki update included in Debian Lenny 5.0.9 to address a cross site scripting issue had a regression rendering links to external websites broken. This update corrects that regression. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2320-1 CVE-2011-2510 | Version: | 5 |
Platform(s): | Debian GNU/Linux 5.0 | Product(s): | dokuwiki |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:20271 | |||
Oval ID: | oval:org.mitre.oval:def:20271 | ||
Title: | DSA-1976-1 dokuwiki - several vulnerabilities | ||
Description: | Several vulnerabilities have been discovered in dokuwiki, a standards compliant simple to use wiki. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1976-1 CVE-2010-0287 CVE-2010-0288 CVE-2010-0289 | Version: | 5 |
Platform(s): | Debian GNU/Linux 5.0 | Product(s): | dokuwiki |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:6751 | |||
Oval ID: | oval:org.mitre.oval:def:6751 | ||
Title: | DSA-1976 dokuwiki -- several vulnerabilities | ||
Description: | Several vulnerabilities have been discovered in dokuwiki, a standards compliant simple to use wiki. The Common Vulnerabilities and Exposures project identifies the following problems: It was discovered that an internal variable is not properly sanitised before being used to list directories. This can be exploited to list contents of arbitrary directories. It was discovered that the ACL Manager plugin doesn’t properly check the administrator permissions. This allow an attacker to introduce arbitrary ACL rules and thus gaining access to a closed Wiki. It was discovered that the ACL Manager plugin doesn’t have protections against cross-site request forgeries. This can be exploited to change the access control rules by tricking a logged in administrator into visiting a malicious web site. The oldstable distribution is not affected by these problems. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1976 CVE-2010-0287 CVE-2010-0288 CVE-2010-0289 | Version: | 5 |
Platform(s): | Debian GNU/Linux 5.0 | Product(s): | dokuwiki |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2012-11-02 | Name : Fedora Update for dokuwiki FEDORA-2012-16605 File : nvt/gb_fedora_2012_16605_dokuwiki_fc16.nasl |
2012-11-02 | Name : Fedora Update for dokuwiki FEDORA-2012-16614 File : nvt/gb_fedora_2012_16614_dokuwiki_fc17.nasl |
2012-08-10 | Name : FreeBSD Ports: dokuwiki File : nvt/freebsd_dokuwiki9.nasl |
2011-10-16 | Name : Debian Security Advisory DSA 2320-1 (dokuwiki) File : nvt/deb_2320_1.nasl |
2011-09-30 | Name : DokuWiki '.php' Files Information Disclosure Vulnerability File : nvt/secpod_dokuwiki_php_info_disc_vuln.nasl |
2011-07-12 | Name : Fedora Update for dokuwiki FEDORA-2011-8831 File : nvt/gb_fedora_2011_8831_dokuwiki_fc15.nasl |
2011-07-08 | Name : Fedora Update for dokuwiki FEDORA-2011-8816 File : nvt/gb_fedora_2011_8816_dokuwiki_fc14.nasl |
2010-03-02 | Name : Fedora Update for dokuwiki FEDORA-2010-0770 File : nvt/gb_fedora_2010_0770_dokuwiki_fc11.nasl |
2010-03-02 | Name : Fedora Update for dokuwiki FEDORA-2010-0800 File : nvt/gb_fedora_2010_0800_dokuwiki_fc12.nasl |
2010-02-19 | Name : DokuWiki Multiple Cross Site Request Forgery Vulnerabilities File : nvt/gb_dokuwiki_mult_csrf_vuln.nasl |
2010-02-10 | Name : FreeBSD Ports: dokuwiki File : nvt/freebsd_dokuwiki5.nasl |
2010-01-18 | Name : DokuWiki Multiple Vulnerabilities File : nvt/dokuwiki_multiple_vuln.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
75763 | DokuWiki Multiple Script Direct Request Path Disclosure |
73200 | DokuWiki RSS Link rss Tag XSS DokuWiki contains a flaw that allows a remote cross-site scripting (XSS) attack. This flaw exists because the application does not validate input passed via the 'rss' tag when adding an RSS Link. This may allow a user to create a specially crafted URL that would execute arbitrary script code in a user's browser within the trust relationship between their browser and the server. |
61710 | DokuWiki lib/plugins/acl/ajax.php Access Control Rule Authentication Bypass |
61709 | DokuWiki lib/plugins/acl/ajax.php ns Parameter Traversal Arbitrary Directory ... |
61708 | DokuWiki plugins/acl/ajax.php Access Control Rule Manipulation CSRF |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2013-04-20 | Name : The remote Mandriva Linux host is missing a security update. File : mandriva_MDVSA-2013-073.nasl - Type : ACT_GATHER_INFO |
2013-01-09 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201301-07.nasl - Type : ACT_GATHER_INFO |
2012-10-30 | Name : The remote Fedora host is missing a security update. File : fedora_2012-16605.nasl - Type : ACT_GATHER_INFO |
2012-10-30 | Name : The remote Fedora host is missing a security update. File : fedora_2012-16614.nasl - Type : ACT_GATHER_INFO |
2012-10-25 | Name : The remote Fedora host is missing a security update. File : fedora_2012-16550.nasl - Type : ACT_GATHER_INFO |
2012-07-19 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_2fe4b57fd11011e1ac7610bf48230856.nasl - Type : ACT_GATHER_INFO |
2011-10-10 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2320.nasl - Type : ACT_GATHER_INFO |
2011-07-07 | Name : The remote Fedora host is missing a security update. File : fedora_2011-8816.nasl - Type : ACT_GATHER_INFO |
2011-07-07 | Name : The remote Fedora host is missing a security update. File : fedora_2011-8831.nasl - Type : ACT_GATHER_INFO |
2010-07-01 | Name : The remote Fedora host is missing a security update. File : fedora_2010-0770.nasl - Type : ACT_GATHER_INFO |
2010-07-01 | Name : The remote Fedora host is missing a security update. File : fedora_2010-0800.nasl - Type : ACT_GATHER_INFO |
2010-02-24 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1976.nasl - Type : ACT_GATHER_INFO |
2010-01-19 | Name : The remote web server is hosting an application that is affected by a securit... File : dokuwiki_acl_security_bypass_vulnerability.nasl - Type : ACT_ATTACK |
2010-01-19 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_848539dc045811df8dd7002170daae37.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:37:40 |
|
2013-01-09 05:18:04 |
|