Unrated severityNVD Advisory· Published Oct 22, 2014· Updated May 6, 2026
CVE-2014-8763
CVE-2014-8763
Description
DokuWiki before 2014-05-05b, when using Active Directory for LDAP authentication, allows remote attackers to bypass authentication via a password starting with a null (\0) character and a valid user name, which triggers an unauthenticated bind.
Affected products
3cpe:2.3:o:mageia_project:mageia:3.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:mageia_project:mageia:3.0:*:*:*:*:*:*:*
- cpe:2.3:o:mageia_project:mageia:4.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- advisories.mageia.org/MGASA-2014-0438.htmlnvd
- secunia.com/advisories/61983nvd
- www.debian.org/security/2014/dsa-3059nvd
- www.freelists.org/post/dokuwiki/Fwd-Dokuwiki-maybe-security-issue-Null-byte-poisoning-in-LDAP-authenticationnvd
- www.openwall.com/lists/oss-security/2014/10/13/3nvd
- www.openwall.com/lists/oss-security/2014/10/16/9nvd
- github.com/splitbrain/dokuwiki/pull/868nvd
News mentions
0No linked articles in our index yet.