Information disclosure in DokuWiki - CVE-2011-3727
Published: September 24, 2011 / Updated: August 11, 2020
DokuWiki
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
DokuWiki 2009-12-25c allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by lib/tpl/index.php and certain other files.
How to mitigate CVE-2011-3727
Sources
- http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README
- http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/dokuwiki-2009-12-25c
- http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090755.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090899.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090938.html
- http://security.gentoo.org/glsa/glsa-201301-07.xml
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:073
- http://www.openwall.com/lists/oss-security/2011/06/27/6
- http://www.securityfocus.com/bid/56328