Ikiwiki » Ikiwiki » 2.13 : Security Vulnerabilities (CVSS score >= 5)
Cpe Name:
cpe:/a:ikiwiki:ikiwiki:2.13
# |
CVE ID
|
CWE ID
|
# of Exploits
|
Vulnerability Type(s)
|
Publish Date
|
Update Date
|
Score
|
Gained Access Level
|
Access
|
Complexity
|
Authentication
|
Conf.
|
Integ.
|
Avail.
|
1 |
CVE-2019-9187 |
918 |
|
|
2019-06-05 |
2019-07-17 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
ikiwiki before 3.20170111.1 and 3.2018x and 3.2019x before 3.20190228 allows SSRF via the aggregate plugin. The impact also includes reading local files via file: URIs. |
2 |
CVE-2017-0356 |
287 |
|
Bypass |
2018-04-13 |
2018-05-18 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
A flaw, similar to to CVE-2016-9646, exists in ikiwiki before 3.20170111, in the passwordauth plugin's use of CGI::FormBuilder, allowing an attacker to bypass authentication via repeated parameters. |
3 |
CVE-2016-9646 |
287 |
|
|
2018-04-13 |
2018-05-18 |
5.0 |
None |
Remote |
Low |
Not required |
None |
Partial |
None |
ikiwiki before 3.20161229 incorrectly called the CGI::FormBuilder->field method (similar to the CGI->param API that led to Bugzilla's CVE-2014-1572), which can be abused to lead to commit metadata forgery. |
4 |
CVE-2009-2944 |
|
|
|
2009-08-31 |
2017-08-16 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
Incomplete blacklist vulnerability in the teximg plugin in ikiwiki before 3.1415926 and 2.x before 2.53.4 allows context-dependent attackers to read arbitrary files via crafted TeX commands. |
5 |
CVE-2008-0169 |
264 |
|
Bypass |
2008-06-03 |
2017-08-07 |
6.8 |
User |
Remote |
Medium |
Not required |
Partial |
Partial |
Partial |
Plugin/passwordauth.pm (aka the passwordauth plugin) in ikiwiki 1.34 through 2.47 allows remote attackers to bypass authentication, and login to any account for which an OpenID identity is configured and a password is not configured, by specifying an empty password during the login sequence. |
Total number of vulnerabilities :
5
Page :
1
(This Page)