Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-7964

Опубликовано: 31 окт. 2016
Источник: debian

Описание

The sendRequest method in HTTPClient Class in file /inc/HTTPClient.php in DokuWiki 2016-06-26a and older, when media file fetching is enabled, has no way to restrict access to private networks. This allows users to scan ports of internal networks via SSRF, such as 10.0.0.1/8, 172.16.0.0/12, and 192.168.0.0/16.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
dokuwikifixed2024-02-06b+dfsg-7package

Примечания

  • Documented as out-of-scope/wontfix by Dokuwiki upstream

  • https://github.com/splitbrain/dokuwiki/issues/1708

  • 2024-02-06b+dfsg-7 added a NOTE in README.Debian

Связанные уязвимости

CVSS3: 8.6
ubuntu
больше 9 лет назад

The sendRequest method in HTTPClient Class in file /inc/HTTPClient.php in DokuWiki 2016-06-26a and older, when media file fetching is enabled, has no way to restrict access to private networks. This allows users to scan ports of internal networks via SSRF, such as 10.0.0.1/8, 172.16.0.0/12, and 192.168.0.0/16.

CVSS3: 8.6
nvd
больше 9 лет назад

The sendRequest method in HTTPClient Class in file /inc/HTTPClient.php in DokuWiki 2016-06-26a and older, when media file fetching is enabled, has no way to restrict access to private networks. This allows users to scan ports of internal networks via SSRF, such as 10.0.0.1/8, 172.16.0.0/12, and 192.168.0.0/16.

CVSS3: 8.6
github
больше 3 лет назад

The sendRequest method in HTTPClient Class in file /inc/HTTPClient.php in DokuWiki 2016-06-26a and older, when media file fetching is enabled, has no way to restrict access to private networks. This allows users to scan ports of internal networks via SSRF, such as 10.0.0.1/8, 172.16.0.0/12, and 192.168.0.0/16.