CVE-2016-7965

NameCVE-2016-7965
DescriptionDokuWiki 2016-06-26a and older uses $_SERVER[HTTP_HOST] instead of the baseurl setting as part of the password-reset URL. This can lead to phishing attacks. (A remote unauthenticated attacker can change the URL's hostname via the HTTP Host header.) The vulnerability can be triggered only if the Host header is not part of the web server routing process (e.g., if several domains are served by the same web server).
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs844732

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
dokuwiki (PTS)jessie, jessie (lts)0.0.20140505.a+dfsg-4+deb8u1vulnerable
buster0.0.20180422.a-2vulnerable
bullseye0.0.20180422.a-2.1vulnerable
bookworm0.0.20220731.a-2vulnerable
sid, trixie0.0.20220731.a-3vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
dokuwikisource(unstable)(unfixed)unimportant844732

Notes

https://github.com/splitbrain/dokuwiki/issues/1709
Can be adresesd by properly configure dokuwiki as per
https://github.com/splitbrain/dokuwiki/issues/1709#issuecomment-262337572

Search for package or bug name: Reporting problems