DokuWiki before 2014-05-05b, when using Active Directory for LDAP authentication, allows remote attackers to bypass authentication via a password starting with a null (\0) character and a valid user name, which triggers an unauthenticated bind.
advisories.mageia.org/MGASA-2014-0438.html
secunia.com/advisories/61983
www.debian.org/security/2014/dsa-3059
www.freelists.org/post/dokuwiki/Fwd-Dokuwiki-maybe-security-issue-Null-byte-poisoning-in-LDAP-authentication
www.openwall.com/lists/oss-security/2014/10/13/3
www.openwall.com/lists/oss-security/2014/10/16/9
github.com/splitbrain/dokuwiki/pull/868