Vulnerability Description
ikiwiki before 3.20161229 incorrectly called the CGI::FormBuilder->field method (similar to the CGI->param API that led to Bugzilla's CVE-2014-1572), which can be abused to lead to commit metadata forgery.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ikiwiki | Ikiwiki | < 3.20161229 |
| Debian | Debian Linux | 7.0 |
Related Weaknesses (CWE)
References
- https://ikiwiki.info/security/#cve-2016-9646Vendor Advisory
- https://marc.info/?l=oss-security&m=148304341511854&w=2Third Party Advisory
- https://security-tracker.debian.org/tracker/CVE-2016-9646Issue TrackingThird Party Advisory
- https://www.debian.org/security/2017/dsa-3760Third Party Advisory
- https://ikiwiki.info/security/#cve-2016-9646Vendor Advisory
- https://marc.info/?l=oss-security&m=148304341511854&w=2Third Party Advisory
- https://security-tracker.debian.org/tracker/CVE-2016-9646Issue TrackingThird Party Advisory
- https://www.debian.org/security/2017/dsa-3760Third Party Advisory
FAQ
What is CVE-2016-9646?
CVE-2016-9646 is a vulnerability with a CVSS score of 5.3 (MEDIUM). ikiwiki before 3.20161229 incorrectly called the CGI::FormBuilder->field method (similar to the CGI->param API that led to Bugzilla's CVE-2014-1572), which can be abused to lead to commit metadata for...
How severe is CVE-2016-9646?
CVE-2016-9646 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-9646?
Check the references section above for vendor advisories and patch information. Affected products include: Ikiwiki Ikiwiki, Debian Debian Linux.