{"api_version":"1","generated_at":"2026-04-23T04:21:08+00:00","cve":"CVE-2012-3354","urls":{"html":"https://cve.report/CVE-2012-3354","api":"https://cve.report/api/cve/CVE-2012-3354.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2012-3354","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2012-3354"},"summary":{"title":"CVE-2012-3354","description":"doku.php in DokuWiki, as used in Fedora 16, 17, and 18, when certain PHP error levels are set, allows remote attackers to obtain sensitive information via the prefix parameter, which reveals the installation path in an error message.","state":"PUBLIC","assigner":"secalert@redhat.com","published_at":"2012-11-20 00:55:00","updated_at":"2013-12-13 05:02:00"},"problem_types":["CWE-200"],"metrics":[],"references":[{"url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090755.html","name":"FEDORA-2012-16550","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 18 Update: dokuwiki-0-0.14.20121013.fc18","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.openwall.com/lists/oss-security/2012/06/24/2","name":"[oss-security] 20120624 CVE request: Full path disclosure in DokuWiki","refsource":"MLIST","tags":[],"title":"oss-security - CVE request: Full path disclosure in DokuWiki","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=835145","name":"https://bugzilla.redhat.com/show_bug.cgi?id=835145","refsource":"MISC","tags":[],"title":"Bug 835145 – CVE-2012-3354 dokuwiki: Full path disclosure with PHP error level enabled","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.openwall.com/lists/oss-security/2012/06/25/2","name":"[oss-security] 20120624 Re: CVE request: Full path disclosure in DokuWiki","refsource":"MLIST","tags":[],"title":"oss-security - Re: CVE request: Full path disclosure in DokuWiki","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.freelists.org/post/dokuwiki/Fwd-DokuWiki-Full-path-disclosure","name":"http://www.freelists.org/post/dokuwiki/Fwd-DokuWiki-Full-path-disclosure","refsource":"MISC","tags":[],"title":"[dokuwiki] Fwd: DokuWiki - Full path disclosure - dokuwiki - FreeLists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:073","name":"MDVSA-2013:073","refsource":"MANDRIVA","tags":[],"title":"Support / Security / Advisories /  / MDVSA-2013:073 | Mandriva","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090938.html","name":"FEDORA-2012-16605","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 16 Update: dokuwiki-0-0.14.20121013.fc16","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090899.html","name":"FEDORA-2012-16614","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 17 Update: dokuwiki-0-0.14.20121013.fc17","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2012-3354","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-3354","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2012","cve_id":"3354","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"dokuwiki","cpe5":"dokuwiki","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"3354","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"dokuwiki","cpe5":"dokuwiki","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"3354","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"16","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"3354","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"17","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"3354","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"18","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"3354","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"16","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"3354","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"17","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2012","cve_id":"3354","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"18","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2012-3354","ASSIGNER":"secalert@redhat.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"doku.php in DokuWiki, as used in Fedora 16, 17, and 18, when certain PHP error levels are set, allows remote attackers to obtain sensitive information via the prefix parameter, which reveals the installation path in an error message."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_affected":"=","version_value":"n/a"}]}}]}}]}},"references":{"reference_data":[{"url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090755.html","refsource":"MISC","name":"http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090755.html"},{"url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090899.html","refsource":"MISC","name":"http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090899.html"},{"url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090938.html","refsource":"MISC","name":"http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090938.html"},{"url":"http://www.freelists.org/post/dokuwiki/Fwd-DokuWiki-Full-path-disclosure","refsource":"MISC","name":"http://www.freelists.org/post/dokuwiki/Fwd-DokuWiki-Full-path-disclosure"},{"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:073","refsource":"MISC","name":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:073"},{"url":"http://www.openwall.com/lists/oss-security/2012/06/24/2","refsource":"MISC","name":"http://www.openwall.com/lists/oss-security/2012/06/24/2"},{"url":"http://www.openwall.com/lists/oss-security/2012/06/25/2","refsource":"MISC","name":"http://www.openwall.com/lists/oss-security/2012/06/25/2"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=835145","refsource":"MISC","name":"https://bugzilla.redhat.com/show_bug.cgi?id=835145"}]}},"nvd":{"publishedDate":"2012-11-20 00:55:00","lastModifiedDate":"2013-12-13 05:02:00","problem_types":["CWE-200"],"metrics":{"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:N/A:N","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":4.3},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:dokuwiki:dokuwiki:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2012","CveId":"3354","Ordinal":"56101","Title":"CVE-2012-3354","CVE":"CVE-2012-3354","Year":"2012"},"notes":[{"CveYear":"2012","CveId":"3354","Ordinal":"1","NoteData":"doku.php in DokuWiki, as used in Fedora 16, 17, and 18, when certain PHP error levels are set, allows remote attackers to obtain sensitive information via the prefix parameter, which reveals the installation path in an error message.","Type":"Description","Title":null},{"CveYear":"2012","CveId":"3354","Ordinal":"2","NoteData":"2012-11-19","Type":"Other","Title":"Published"},{"CveYear":"2012","CveId":"3354","Ordinal":"3","NoteData":"2013-12-10","Type":"Other","Title":"Modified"}]}}}