The dcXmlRpc::setUser method in nc/core/class.dc.xmlrpc.php in Dotclear before 2.6.3 allows remote attackers to bypass authentication via an empty password in an XML-RPC request.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:08
Type | Values Removed | Values Added |
---|---|---|
References | () http://dotclear.org/blog/post/2014/05/16/Dotclear-2.6.3 - Vendor Advisory | |
References | () http://karmainsecurity.com/KIS-2014-05 - Exploit | |
References | () http://packetstormsecurity.com/files/126766/Dotclear-2.6.2-Authentication-Bypass.html - Exploit | |
References | () http://seclists.org/fulldisclosure/2014/May/107 - Exploit | |
References | () http://secunia.com/advisories/58675 - |
Information
Published : 2014-06-11 14:55
Updated : 2024-11-21 02:08
NVD link : CVE-2014-3781
Mitre link : CVE-2014-3781
CVE.ORG link : CVE-2014-3781
JSON object : View
Products Affected
dotclear
- dotclear
CWE
CWE-287
Improper Authentication