CVE-2014-8764

DokuWiki 2014-05-05a and earlier, when using Active Directory for LDAP authentication, allows remote attackers to bypass authentication via a user name and password starting with a null (\0) character, which triggers an anonymous bind.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:mageia_project:mageia:3.0:*:*:*:*:*:*:*
cpe:2.3:o:mageia_project:mageia:4.0:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:dokuwiki:dokuwiki:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:19

Type Values Removed Values Added
References () http://advisories.mageia.org/MGASA-2014-0438.html - () http://advisories.mageia.org/MGASA-2014-0438.html -
References () http://secunia.com/advisories/61983 - () http://secunia.com/advisories/61983 -
References () http://www.debian.org/security/2014/dsa-3059 - () http://www.debian.org/security/2014/dsa-3059 -
References () http://www.freelists.org/post/dokuwiki/Fwd-Dokuwiki-maybe-security-issue-Null-byte-poisoning-in-LDAP-authentication - () http://www.freelists.org/post/dokuwiki/Fwd-Dokuwiki-maybe-security-issue-Null-byte-poisoning-in-LDAP-authentication -
References () http://www.openwall.com/lists/oss-security/2014/10/13/3 - () http://www.openwall.com/lists/oss-security/2014/10/13/3 -
References () http://www.openwall.com/lists/oss-security/2014/10/16/9 - () http://www.openwall.com/lists/oss-security/2014/10/16/9 -
References () https://github.com/splitbrain/dokuwiki/pull/868 - () https://github.com/splitbrain/dokuwiki/pull/868 -

Information

Published : 2014-10-22 14:55

Updated : 2024-11-21 02:19


NVD link : CVE-2014-8764

Mitre link : CVE-2014-8764

CVE.ORG link : CVE-2014-8764


JSON object : View

Products Affected

dokuwiki

  • dokuwiki

mageia_project

  • mageia
CWE
CWE-287

Improper Authentication