Unrestricted file upload vulnerability in the Blog appearance in the "Install or upgrade manually" module in Dotclear through 2.10.4 allows remote authenticated super-administrators to execute arbitrary code by uploading a theme file with an zip extension, and then accessing it via unspecified vectors.
References
Link | Resource |
---|---|
http://dev.dotclear.org/2.0/changeset/445e9ff79a1fa81033591761d6a340e219d159b2 | Issue Tracking Patch |
http://dev.dotclear.org/2.0/ticket/2214 | Mitigation Vendor Advisory |
http://www.securityfocus.com/bid/94246 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2016-11-10 20:59
Updated : 2024-02-04 19:11
NVD link : CVE-2016-9268
Mitre link : CVE-2016-9268
CVE.ORG link : CVE-2016-9268
JSON object : View
Products Affected
dotclear
- dotclear
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type