First published: Thu Dec 29 2016(Updated: )
ikiwiki before 3.20161229 incorrectly called the CGI::FormBuilder->field method (similar to the CGI->param API that led to Bugzilla's CVE-2014-1572), which can be abused to lead to commit metadata forgery.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/ikiwiki | 3.20200202.3-1 3.20200202.4-2 | |
Ikiwiki Hosting Project | <3.20161229 | |
Debian | =7.0 | |
Debian | =8.0 | |
Debian | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9646 is considered to be a medium severity vulnerability due to its potential for commit metadata forgery.
To remediate CVE-2016-9646, upgrade to ikiwiki version 3.20200202.3-1 or later.
CVE-2016-9646 affects versions of ikiwiki prior to 3.20161229 across various Debian releases.
CVE-2016-9646 can be exploited to forge commit metadata due to improper handling of input.
Yes, CVE-2016-9646 is similar in nature to Bugzilla's CVE-2014-1572, involving the CGI::FormBuilder->field method.