CVE-2014-8764
Debian Security Advisory 3059-1
Severity Score
9.8
*CVSS v3
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
DokuWiki 2014-05-05a and earlier, when using Active Directory for LDAP authentication, allows remote attackers to bypass authentication via a user name and password starting with a null (\0) character, which triggers an anonymous bind.
DokuWiki 2014-05-05a y anteriores, cuando utiliza Active Directory para la autenticación LDAP, permite a atacantes remotos evadir la autenticación a través de un nombre de usuario y una contraseña que empiece por un caracter nulo (\0), lo que provoca un bind anónimo.
Two vulnerabilities have been discovered in dokuwiki. Access control in the media manager was insufficiently restricted and authentication could be bypassed when using Active Directory for LDAP authentication.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2014-10-13 CVE Reserved
- 2014-10-22 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-287: Improper Authentication
CAPEC
References (7)
URL | Tag | Source |
---|---|---|
http://advisories.mageia.org/MGASA-2014-0438.html | X_refsource_confirm | |
http://secunia.com/advisories/61983 | Third Party Advisory | |
http://www.freelists.org/post/dokuwiki/Fwd-Dokuwiki-maybe-security-issue-Null-byte-poisoning-in-LDAP-authentication | Mailing List | |
http://www.openwall.com/lists/oss-security/2014/10/13/3 | Mailing List |
|
http://www.openwall.com/lists/oss-security/2014/10/16/9 | Mailing List |
|
https://github.com/splitbrain/dokuwiki/pull/868 | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.debian.org/security/2014/dsa-3059 | 2016-07-15 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Mageia Project Search vendor "Mageia Project" | Mageia Search vendor "Mageia Project" for product "Mageia" | 3.0 Search vendor "Mageia Project" for product "Mageia" and version "3.0" | - |
Affected
| ||||||
Mageia Project Search vendor "Mageia Project" | Mageia Search vendor "Mageia Project" for product "Mageia" | 4.0 Search vendor "Mageia Project" for product "Mageia" and version "4.0" | - |
Affected
| ||||||
Dokuwiki Search vendor "Dokuwiki" | Dokuwiki Search vendor "Dokuwiki" for product "Dokuwiki" | <= 2013-12-08 Search vendor "Dokuwiki" for product "Dokuwiki" and version " <= 2013-12-08" | - |
Affected
|