DokuWiki before 2014-05-05b, when using Active Directory for LDAP authentication, allows remote attackers to bypass authentication via a password starting with a null (\0) character and a valid user name, which triggers an unauthenticated bind.Referenceshttp://www.freelists.org/post/dokuwiki/Fwd-Dokuwiki-maybe-security-issue-Null-byte-poisoning-in-LDAP-authenticationhttp://secunia.com/advisories/61983http://advisories.mageia.org/MGASA-2014-0438.htmlhttp://www.openwall.com/lists/oss-security/2014/10/13/3http://www.openwall.com/lists/oss-security/2014/10/16/9http://www.debian.org/security/2014/dsa-3059https://github.com/splitbrain/dokuwiki/pull/868