First published: Wed Oct 22 2014(Updated: )
DokuWiki before 2014-05-05b, when using Active Directory for LDAP authentication, allows remote attackers to bypass authentication via a password starting with a null (\0) character and a valid user name, which triggers an unauthenticated bind.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
DokuWiki | <=2014-05-05a | |
Mageia | =3.0 | |
Mageia | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8763 is considered a high severity vulnerability due to its potential for allowing unauthenticated access.
CVE-2014-8763 affects DokuWiki before version 2014-05-05b and Mageia versions 3.0 and 4.0.
To fix CVE-2014-8763, upgrade to DokuWiki version 2014-05-05b or later, or apply any relevant patches for Mageia.
The exploit mechanism for CVE-2014-8763 involves using a password that starts with a null character, enabling attackers to bypass LDAP authentication.
Mitigation for CVE-2014-8763 without updating may include disabling LDAP authentication or using alternative authentication methods until a patch can be applied.