CVE-2011-1584

The updateFile function in inc/core/class.dc.media.php in the Media Manager in Dotclear before 2.2.3 does not properly restrict pathnames, which allows remote authenticated users to upload and execute arbitrary PHP code via the media_path or media_file parameter. NOTE: some of these details are obtained from third party information.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:dotclear:dotclear:*:*:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:1.2.5:*:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:1.2.6:*:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:1.2.7:*:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:1.2.8:*:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.0:*:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.0:beta_2:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.0:beta_3:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.0:beta_4:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.0:beta_5.2:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.0:beta_5.4:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.0:beta_6:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.0:beta_7:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.0:rc1:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.0:rc2:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.1:*:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.1.4:*:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.1.5:*:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.1.6:*:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.1.7:*:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.2:*:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.2.1:*:*:*:*:*:*:*

History

21 Nov 2024, 01:26

Type Values Removed Values Added
References () http://dev.dotclear.org/2.0/changeset/2:3427 - Exploit, Patch () http://dev.dotclear.org/2.0/changeset/2:3427 - Exploit, Patch
References () http://dotclear.org/blog/post/2011/04/01/Dotclear-2.2.3 - Patch, Vendor Advisory () http://dotclear.org/blog/post/2011/04/01/Dotclear-2.2.3 - Patch, Vendor Advisory
References () http://fr.dotclear.org/blog/post/2011/04/01/Dotclear-2.2.3 - Vendor Advisory () http://fr.dotclear.org/blog/post/2011/04/01/Dotclear-2.2.3 - Vendor Advisory
References () http://openwall.com/lists/oss-security/2011/04/13/19 - () http://openwall.com/lists/oss-security/2011/04/13/19 -
References () http://openwall.com/lists/oss-security/2011/04/14/8 - () http://openwall.com/lists/oss-security/2011/04/14/8 -
References () http://openwall.com/lists/oss-security/2011/04/15/11 - () http://openwall.com/lists/oss-security/2011/04/15/11 -
References () http://openwall.com/lists/oss-security/2011/04/15/7 - () http://openwall.com/lists/oss-security/2011/04/15/7 -
References () http://secunia.com/advisories/44049 - Vendor Advisory () http://secunia.com/advisories/44049 - Vendor Advisory
References () http://www.arcabit.com/english/home/a-flaw-in-dotclear - () http://www.arcabit.com/english/home/a-flaw-in-dotclear -

Information

Published : 2011-06-08 10:36

Updated : 2024-11-21 01:26


NVD link : CVE-2011-1584

Mitre link : CVE-2011-1584

CVE.ORG link : CVE-2011-1584


JSON object : View

Products Affected

dotclear

  • dotclear
CWE
CWE-264

Permissions, Privileges, and Access Controls