Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2016-7964

Опубликовано: 31 окт. 2016
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.3
CVSS3: 8.6

Описание

The sendRequest method in HTTPClient Class in file /inc/HTTPClient.php in DokuWiki 2016-06-26a and older, when media file fetching is enabled, has no way to restrict access to private networks. This allows users to scan ports of internal networks via SSRF, such as 10.0.0.1/8, 172.16.0.0/12, and 192.168.0.0/16.

РелизСтатусПримечание
artful

ignored

end of life
bionic

ignored

cosmic

ignored

devel

ignored

esm-apps/bionic

ignored

esm-apps/xenial

ignored

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored]
precise

ignored

end of life
precise/esm

DNE

precise was needs-triage
trusty

ignored

Показывать по

EPSS

Процентиль: 68%
0.00559
Низкий

4.3 Medium

CVSS2

8.6 High

CVSS3

Связанные уязвимости

CVSS3: 8.6
nvd
больше 9 лет назад

The sendRequest method in HTTPClient Class in file /inc/HTTPClient.php in DokuWiki 2016-06-26a and older, when media file fetching is enabled, has no way to restrict access to private networks. This allows users to scan ports of internal networks via SSRF, such as 10.0.0.1/8, 172.16.0.0/12, and 192.168.0.0/16.

CVSS3: 8.6
debian
больше 9 лет назад

The sendRequest method in HTTPClient Class in file /inc/HTTPClient.php ...

CVSS3: 8.6
github
больше 3 лет назад

The sendRequest method in HTTPClient Class in file /inc/HTTPClient.php in DokuWiki 2016-06-26a and older, when media file fetching is enabled, has no way to restrict access to private networks. This allows users to scan ports of internal networks via SSRF, such as 10.0.0.1/8, 172.16.0.0/12, and 192.168.0.0/16.

EPSS

Процентиль: 68%
0.00559
Низкий

4.3 Medium

CVSS2

8.6 High

CVSS3