漏洞类别:CGI
漏洞等级:
漏洞信息
DokuWiki is a simple to use and highly versatile Open Source wiki software that doesn't require a database.
DokuWiki has the following vulnerabilities:
CVE-2016-7964: The sendRequest method in HTTPClient Class, implemented in the /inc/HTTPClient.php source file fails to restrict access to private networks, such as, 10.0.0.1/8, 172.16.0.0/12, 192.168.0.0/16. This allows an attacker to scan the internal networks via Server Side Request Forgery (SSRF) attacks.
CVE-2016-7965: Vulnerable DokuWiki versions use $_SERVER[HTTP_HOST] instead of the baseurl setting as part of the password-reset URL. This can allow a remote unauthenticated attacker to change the URL's hostname via the HTTP Host header and conduct phishing attacks.
Affected Versions:
DokuWiki 2016-06-26a and prior
漏洞危害
Depending on the vulnerability being exploited, a remote attacker can conduct SSRF or phishing attacks against a targeted user.
解决方案
Updated DokuWiki version is not available.
Workaround:
Customers are advised to contact the vendor for updates pertaining to these vulnerabilities.
Customers are advised to implement security mechanisms such as IPS/IDS/WAF to help prevent such vulnerabilities.
0day
文章评论