Vulnerability Description
DokuWiki before 2006-03-09c enables the debug feature by default, which allows remote attackers to obtain sensitive information by calling doku.php with the X-DOKUWIKI-DO HTTP header set to "debug".
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Andreas Gohr | Dokuwiki | <= release_2006-03-09 |
References
- http://retrogod.altervista.org/dokuwiki_2006-03-09b_cmd.htmlExploit
- http://secunia.com/advisories/21936
- http://security.gentoo.org/glsa/glsa-200609-10.xml
- http://securityreason.com/securityalert/1537
- http://www.securityfocus.com/archive/1/445516/100/0/threaded
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28819
- http://retrogod.altervista.org/dokuwiki_2006-03-09b_cmd.htmlExploit
- http://secunia.com/advisories/21936
- http://security.gentoo.org/glsa/glsa-200609-10.xml
- http://securityreason.com/securityalert/1537
- http://www.securityfocus.com/archive/1/445516/100/0/threaded
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28819
FAQ
What is CVE-2006-4679?
CVE-2006-4679 is a vulnerability with a CVSS score of 5.0 (MEDIUM). DokuWiki before 2006-03-09c enables the debug feature by default, which allows remote attackers to obtain sensitive information by calling doku.php with the X-DOKUWIKI-DO HTTP header set to "debug".
How severe is CVE-2006-4679?
CVE-2006-4679 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-4679?
Check the references section above for vendor advisories and patch information. Affected products include: Andreas Gohr Dokuwiki.