CVE-2014-3781

The dcXmlRpc::setUser method in nc/core/class.dc.xmlrpc.php in Dotclear before 2.6.3 allows remote attackers to bypass authentication via an empty password in an XML-RPC request.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:dotclear:dotclear:*:*:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.6:-:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.6:rc:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.6.1:*:*:*:*:*:*:*

History

21 Nov 2024, 02:08

Type Values Removed Values Added
References () http://dotclear.org/blog/post/2014/05/16/Dotclear-2.6.3 - Vendor Advisory () http://dotclear.org/blog/post/2014/05/16/Dotclear-2.6.3 - Vendor Advisory
References () http://karmainsecurity.com/KIS-2014-05 - Exploit () http://karmainsecurity.com/KIS-2014-05 - Exploit
References () http://packetstormsecurity.com/files/126766/Dotclear-2.6.2-Authentication-Bypass.html - Exploit () http://packetstormsecurity.com/files/126766/Dotclear-2.6.2-Authentication-Bypass.html - Exploit
References () http://seclists.org/fulldisclosure/2014/May/107 - Exploit () http://seclists.org/fulldisclosure/2014/May/107 - Exploit
References () http://secunia.com/advisories/58675 - () http://secunia.com/advisories/58675 -

Information

Published : 2014-06-11 14:55

Updated : 2024-11-21 02:08


NVD link : CVE-2014-3781

Mitre link : CVE-2014-3781

CVE.ORG link : CVE-2014-3781


JSON object : View

Products Affected

dotclear

  • dotclear
CWE
CWE-287

Improper Authentication