CVE-2016-7965

NameCVE-2016-7965
DescriptionDokuWiki 2016-06-26a and older uses $_SERVER[HTTP_HOST] instead of the baseurl setting as part of the password-reset URL. This can lead to phishing attacks. (A remote unauthenticated attacker can change the URL's hostname via the HTTP Host header.) The vulnerability can be triggered only if the Host header is not part of the web server routing process (e.g., if several domains are served by the same web server).
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium (attack range: remote)
Debian Bugs844732

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
dokuwiki (PTS)jessie0.0.20140505.a+dfsg-4vulnerable
jessie (security)0.0.20140505.a+dfsg-4+deb8u1vulnerable
buster, sid0.0.20180422.a-2vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
dokuwikisource(unstable)(unfixed)unimportant844732

Notes

https://github.com/splitbrain/dokuwiki/issues/1709
Can be adresesd by properly configure dokuwiki as per
https://github.com/splitbrain/dokuwiki/issues/1709#issuecomment-262337572

Search for package or bug name: Reporting problems