{"id":"CVE-2014-8764","details":"DokuWiki 2014-05-05a and earlier, when using Active Directory for LDAP authentication, allows remote attackers to bypass authentication via a user name and password starting with a null (\\0) character, which triggers an anonymous bind.","modified":"2026-04-16T06:23:24.670877959Z","published":"2014-10-22T14:55:08Z","references":[{"type":"ADVISORY","url":"http://advisories.mageia.org/MGASA-2014-0438.html"},{"type":"ADVISORY","url":"http://secunia.com/advisories/61983"},{"type":"ADVISORY","url":"http://www.debian.org/security/2014/dsa-3059"},{"type":"FIX","url":"https://github.com/splitbrain/dokuwiki/pull/868"},{"type":"WEB","url":"http://www.freelists.org/post/dokuwiki/Fwd-Dokuwiki-maybe-security-issue-Null-byte-poisoning-in-LDAP-authentication"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2014/10/13/3"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2014/10/16/9"}],"schema_version":"1.7.5"}