f8095446 | 01-Apr-2015 |
Christopher Smith <chris@jalakai.co.uk> |
add more plugin groups to authplain test |
5b795a65 | 01-Apr-2015 |
Patrick Brown <ptbrown@whoopdedo.org> |
Move language string to authad plugin |
fa4038c7 | 31-Mar-2015 |
Romulo Pereira <romuloccomp@gmail.com> |
translation update |
ecd3aee0 | 31-Mar-2015 |
Alejandro Nunez <nunez.alejandro@gmail.com> |
translation update |
605af2f6 | 28-Mar-2015 |
Jaroslav Lichtblau <jlichtblau@seznam.cz> |
translation update |
b07866dc | 28-Mar-2015 |
Myeongjin <aranet100@gmail.com> |
translation update |
f23f9594 | 18-Mar-2015 |
Andreas Gohr <andi@splitbrain.org> |
SECURITY escape user properties in user manager #1081
The user properties (login, real name, etc) where not properly escaped in the user manager's edit form. This allowed a XSS attack on the superus
SECURITY escape user properties in user manager #1081
The user properties (login, real name, etc) where not properly escaped in the user manager's edit form. This allowed a XSS attack on the superuser by registered users.
Thanks to Filippo Cavallarin from www.segment.technology for discovering this bug.
show more ...
|
abb2621b | 17-Mar-2015 |
Jacob Palm <mail@jacobpalm.dk> |
translation update |
84f66e9f | 16-Mar-2015 |
Sascha Klopp <klopp@rrzn.uni-hannover.de> |
Add english description for new authldap options |
1014a348 | 13-Mar-2015 |
Sascha Klopp <klopp@rrzn.uni-hannover.de> |
Add description for modPass-Option |
07aec029 | 12-Mar-2015 |
Michael Große <grosse@cosmocode.de> |
Escape user strings given to adLDAP |
7910cbbb | 12-Mar-2015 |
Michael Große <grosse@cosmocode.de> |
Explain functions in docstrings |
6fcf992c | 12-Mar-2015 |
Michael Große <grosse@cosmocode.de> |
Clean up code, add phpdoc comments, some refactoring, etc. |
462e9e37 | 12-Mar-2015 |
Michael Große <grosse@cosmocode.de> |
Disable the ``last`` button when filtering groups
Since we cannot effectively filter for groups and have to work with incremental prefetching, the ``last`` button is mostly broken/buggy. Hence it is
Disable the ``last`` button when filtering groups
Since we cannot effectively filter for groups and have to work with incremental prefetching, the ``last`` button is mostly broken/buggy. Hence it is disabled in this usecase.
show more ...
|
c52f6cd2 | 12-Mar-2015 |
Michael Große <grosse@cosmocode.de> |
When filtering for group implement prefetching |
67a31a83 | 12-Mar-2015 |
Michael Große <grosse@cosmocode.de> |
Create and use ad search for user, name and email |
25f80763 | 11-Mar-2015 |
Michael Große <grosse@cosmocode.de> |
Get total number of users in ad, needed for paging |
6619ddf4 | 03-Mar-2015 |
Sascha Klopp <klopp@rrzn.uni-hannover.de> |
Two new authldap config options: 'userkey' denotes the LDAP attribute holding the username, 'modPass' allows to disable password changing by the user. |
42f3fd0a | 25-Feb-2015 |
Cyril Duchon-Doris <Cyril.Duchon-Doris@telecom-paristech.org> |
Reverting changes so as to use already existing function, and adding admin check |
6401de3d | 24-Feb-2015 |
Schplurtz le Déboulonné <schplurtz@laposte.net> |
translation update |
9cbf80e6 | 24-Feb-2015 |
Andreas Gohr <andi@splitbrain.org> |
check permissions in ACL plugin's RPC API component. #1056
Security Fix
Severity: Medium Type: Remote Priviledge Escalation Remote: yes
Vulnerability Details:
This fixes a security hole in
check permissions in ACL plugin's RPC API component. #1056
Security Fix
Severity: Medium Type: Remote Priviledge Escalation Remote: yes
Vulnerability Details:
This fixes a security hole in the ACL plugins remote API component. The plugin failed to check for superuser permissions before executing ACL addition or deletion. This means everybody with permissions to call the XMLRPC API also had permissions to set up their own ACL rules and thus circumventing any existing rules.
Risk Assessment:
The XMLRPC API in DokuWiki is marked experimental and off by default. It also implements an additional safeguard by giving access to a configured circle of users and groups only. So only a minor number of DokuWiki installations will be affected at all. For affected installations the risk is high if users with access to the API are not to be trusted. Thus the overall severity of medium.
Resolution:
Installations applying this commit are safe. A hotfix is about to be released. Meanwhile users are advised to disable the XMLRPC API in the config manager.
show more ...
|
1fa1d6bc | 24-Feb-2015 |
Cyril Duchon-Doris <Cyril.Duchon-Doris@telecom-paristech.org> |
Fixing bugs found by scrutinizer |
6d2588b6 | 24-Feb-2015 |
Cyril Duchon-Doris <Cyril.Duchon-Doris@telecom-paristech.org> |
Adding listAcls to the XMLRPC API as suggested in Issue #1054 |
c2a2396e | 13-Feb-2015 |
Álvaro Iradier <airadier@gmail.com> |
translation update |
cbb4a681 | 12-Feb-2015 |
lainme <lainme993@gmail.com> |
translation update |