{"api_version":"1","generated_at":"2026-04-23T04:21:07+00:00","cve":"CVE-2016-7964","urls":{"html":"https://cve.report/CVE-2016-7964","api":"https://cve.report/api/cve/CVE-2016-7964.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2016-7964","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2016-7964"},"summary":{"title":"CVE-2016-7964","description":"The sendRequest method in HTTPClient Class in file /inc/HTTPClient.php in DokuWiki 2016-06-26a and older, when media file fetching is enabled, has no way to restrict access to private networks. This allows users to scan ports of internal networks via SSRF, such as 10.0.0.1/8, 172.16.0.0/12, and 192.168.0.0/16.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2016-10-31 10:59:00","updated_at":"2016-12-02 23:09:00"},"problem_types":["CWE-918"],"metrics":[],"references":[{"url":"https://github.com/splitbrain/dokuwiki/issues/1708","name":"https://github.com/splitbrain/dokuwiki/issues/1708","refsource":"CONFIRM","tags":["Patch","Third Party Advisory"],"title":"SSRF vulnerability in Dokuwiki · Issue #1708 · splitbrain/dokuwiki · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/94245","name":"94245","refsource":"BID","tags":["Third Party Advisory","VDB Entry"],"title":"DokuWiki CVE-2016-7964 SSRF Security Bypass Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2016-7964","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-7964","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2016","cve_id":"7964","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"dokuwiki","cpe5":"dokuwiki","cpe6":"2016-06-26a","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2016","cve_id":"7964","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"dokuwiki","cpe5":"dokuwiki","cpe6":"2016-06-26a","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2016-7964","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The sendRequest method in HTTPClient Class in file /inc/HTTPClient.php in DokuWiki 2016-06-26a and older, when media file fetching is enabled, has no way to restrict access to private networks. This allows users to scan ports of internal networks via SSRF, such as 10.0.0.1/8, 172.16.0.0/12, and 192.168.0.0/16."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"94245","refsource":"BID","url":"http://www.securityfocus.com/bid/94245"},{"name":"https://github.com/splitbrain/dokuwiki/issues/1708","refsource":"CONFIRM","url":"https://github.com/splitbrain/dokuwiki/issues/1708"}]}},"nvd":{"publishedDate":"2016-10-31 10:59:00","lastModifiedDate":"2016-12-02 23:09:00","problem_types":["CWE-918"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":8.6,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":4},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:N/A:N","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":4.3},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:dokuwiki:dokuwiki:2016-06-26a:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2016","CveId":"7964","Ordinal":"94579","Title":"CVE-2016-7964","CVE":"CVE-2016-7964","Year":"2016"},"notes":[{"CveYear":"2016","CveId":"7964","Ordinal":"1","NoteData":"The sendRequest method in HTTPClient Class in file /inc/HTTPClient.php in DokuWiki 2016-06-26a and older, when media file fetching is enabled, has no way to restrict access to private networks. This allows users to scan ports of internal networks via SSRF, such as 10.0.0.1/8, 172.16.0.0/12, and 192.168.0.0/16.","Type":"Description","Title":null},{"CveYear":"2016","CveId":"7964","Ordinal":"2","NoteData":"2016-10-31","Type":"Other","Title":"Published"},{"CveYear":"2016","CveId":"7964","Ordinal":"3","NoteData":"2016-11-25","Type":"Other","Title":"Modified"}]}}}