Skip to content
Snippets Groups Projects
  1. Apr 28, 2015
  2. Apr 24, 2015
  3. Apr 19, 2015
  4. Apr 16, 2015
  5. Apr 13, 2015
  6. Apr 01, 2015
  7. Mar 31, 2015
  8. Mar 30, 2015
  9. Mar 28, 2015
  10. Mar 27, 2015
  11. Mar 18, 2015
    • Andreas Gohr's avatar
      SECURITY escape user properties in user manager #1081 · f23f9594
      Andreas Gohr authored
      The user properties (login, real name, etc) where not properly escaped
      in the user manager's edit form. This allowed a XSS attack on the
      superuser by registered users.
      
      Thanks to Filippo Cavallarin from www.segment.technology for discovering
      this bug.
      f23f9594
  12. Mar 17, 2015
  13. Mar 16, 2015
  14. Mar 13, 2015
  15. Mar 12, 2015
  16. Mar 11, 2015
  17. Mar 03, 2015
  18. Feb 24, 2015
    • Schplurtz le Déboulonné's avatar
      translation update · 6401de3d
      Schplurtz le Déboulonné authored
      6401de3d
    • Andreas Gohr's avatar
      check permissions in ACL plugin's RPC API component. #1056 · 9cbf80e6
      Andreas Gohr authored
      Security Fix
      
      Severity: Medium
      Type:     Remote Priviledge Escalation
      Remote:   yes
      
      Vulnerability Details:
      
      This fixes a security hole in the ACL plugins remote API component. The
      plugin failed to check for superuser permissions before executing ACL
      addition or deletion. This means everybody with permissions to call the
      XMLRPC API also had permissions to set up their own ACL rules and thus
      circumventing any existing rules.
      
      Risk Assessment:
      
      The XMLRPC API in DokuWiki is marked experimental and off by default. It
      also implements an additional safeguard by giving access to a configured
      circle of users and groups only. So only a minor number of DokuWiki
      installations will be affected at all.
      For affected installations the risk is high if users with access to the
      API are not to be trusted.
      Thus the overall severity of medium.
      
      Resolution:
      
      Installations applying this commit are safe. A hotfix is about to be
      released. Meanwhile users are advised to disable the XMLRPC API in the
      config manager.
      9cbf80e6
  19. Feb 13, 2015
  20. Feb 12, 2015
  21. Feb 09, 2015
  22. Jan 28, 2015
  23. Jan 25, 2015
  24. Jan 15, 2015
  25. Jan 14, 2015
  26. Jan 10, 2015
  27. Jan 08, 2015
  28. Jan 07, 2015
  29. Jan 05, 2015
Loading