Lucene search

K
debianDebianDEBIAN:DLA-1269-1:0F603
HistoryFeb 04, 2018 - 10:37 a.m.

[SECURITY] [DLA 1269-1] dokuwiki security update

2018-02-0410:37:46
lists.debian.org
11

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS3

8.6

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

AI Score

8.6

Confidence

High

EPSS

0.01

Percentile

83.7%

Package : dokuwiki
Version : 0.0.20120125b-2+deb7u2
CVE ID : CVE-2017-18123
Debian Bug : #889281

It was discovered that an XHR/AJAX call did not properly encode user
input in the "dokuwiki" wiki platform. This resulted in a reflected file
download vulnerability.

For Debian 7 "Wheezy", this issue has been fixed in dokuwiki version
0.0.20120125b-2+deb7u2.

We recommend that you upgrade your dokuwiki packages.

Regards,


  ,''`.
 : :'  :     Chris Lamb
 `. `'`      [email protected] / chris-lamb.co.uk
   `-
OSVersionArchitecturePackageVersionFilename
Debian7alldokuwiki< 0.0.20120125b-2+deb7u2dokuwiki_0.0.20120125b-2+deb7u2_all.deb
Debian8alldokuwiki< 0.0.20140505.a+dfsg-4+deb8u1dokuwiki_0.0.20140505.a+dfsg-4+deb8u1_all.deb

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS3

8.6

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

AI Score

8.6

Confidence

High

EPSS

0.01

Percentile

83.7%