The updateFile function in inc/core/class.dc.media.php in the Media Manager in Dotclear before 2.2.3 does not properly restrict pathnames, which allows remote authenticated users to upload and execute arbitrary PHP code via the media_path or media_file parameter. NOTE: some of these details are obtained from third party information.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:26
Type | Values Removed | Values Added |
---|---|---|
References | () http://dev.dotclear.org/2.0/changeset/2:3427 - Exploit, Patch | |
References | () http://dotclear.org/blog/post/2011/04/01/Dotclear-2.2.3 - Patch, Vendor Advisory | |
References | () http://fr.dotclear.org/blog/post/2011/04/01/Dotclear-2.2.3 - Vendor Advisory | |
References | () http://openwall.com/lists/oss-security/2011/04/13/19 - | |
References | () http://openwall.com/lists/oss-security/2011/04/14/8 - | |
References | () http://openwall.com/lists/oss-security/2011/04/15/11 - | |
References | () http://openwall.com/lists/oss-security/2011/04/15/7 - | |
References | () http://secunia.com/advisories/44049 - Vendor Advisory | |
References | () http://www.arcabit.com/english/home/a-flaw-in-dotclear - |
Information
Published : 2011-06-08 10:36
Updated : 2024-11-21 01:26
NVD link : CVE-2011-1584
Mitre link : CVE-2011-1584
CVE.ORG link : CVE-2011-1584
JSON object : View
Products Affected
dotclear
- dotclear
CWE
CWE-264
Permissions, Privileges, and Access Controls