Dotclear before 2.6.2 allows remote attackers to execute arbitrary PHP code via a serialized object in the dc_passwd cookie to a password-protected page, which is not properly handled by (1) inc/public/lib.urlhandlers.php or (2) plugins/pages/_public.php.
References
Link | Resource |
---|---|
http://dotclear.org/blog/post/2014/01/20/Dotclear-2.6.2 | Patch Vendor Advisory |
https://labs.mwrinfosecurity.com/advisories/2014/05/14/dotclear-php-object-injection/ | Exploit |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2014-05-16 15:55
Updated : 2024-02-04 18:35
NVD link : CVE-2014-1613
Mitre link : CVE-2014-1613
CVE.ORG link : CVE-2014-1613
JSON object : View
Products Affected
dotclear
- dotclear
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')