CVE漏洞中文网

0DayBank一个专门收集整理全球互联网漏洞的公开发布网站
  1. 首页
  2. CVE
  3. 正文

CVE-2016-7964 DokuWiki Server Side Request Forgery and Password Reset Address Spoof Vulnerabilities

2016年11月22日 4964点热度 0人点赞 0条评论

漏洞类别:CGI

漏洞等级:

漏洞信息

DokuWiki is a simple to use and highly versatile Open Source wiki software that doesn't require a database.

DokuWiki has the following vulnerabilities:
CVE-2016-7964: The sendRequest method in HTTPClient Class, implemented in the /inc/HTTPClient.php source file fails to restrict access to private networks, such as, 10.0.0.1/8, 172.16.0.0/12, 192.168.0.0/16. This allows an attacker to scan the internal networks via Server Side Request Forgery (SSRF) attacks.
CVE-2016-7965: Vulnerable DokuWiki versions use $_SERVER[HTTP_HOST] instead of the baseurl setting as part of the password-reset URL. This can allow a remote unauthenticated attacker to change the URL's hostname via the HTTP Host header and conduct phishing attacks.

Affected Versions:
DokuWiki 2016-06-26a and prior

漏洞危害

Depending on the vulnerability being exploited, a remote attacker can conduct SSRF or phishing attacks against a targeted user.

解决方案

Updated DokuWiki version is not available.

Workaround:
Customers are advised to contact the vendor for updates pertaining to these vulnerabilities.
Customers are advised to implement security mechanisms such as IPS/IDS/WAF to help prevent such vulnerabilities.

0day

标签: 暂无
最后更新:2016年11月24日

小助手

这个人很懒,什么都没留下

点赞
< 上一篇
下一篇 >

文章评论

您需要 登录 之后才可以评论

COPYRIGHT © 2024 www.pdr.cn CVE漏洞中文网. ALL RIGHTS RESERVED.

鲁ICP备2022031030号

联系邮箱:wpbgssyubnmsxxxkkk@proton.me