Unrestricted file upload vulnerability in the Blog appearance in the "Install or upgrade manually" module in Dotclear through 2.10.4 allows remote authenticated super-administrators to execute arbitrary code by uploading a theme file with an zip extension, and then accessing it via unspecified vectors.
                
            References
                    | Link | Resource | 
|---|---|
| http://dev.dotclear.org/2.0/changeset/445e9ff79a1fa81033591761d6a340e219d159b2 | Issue Tracking Patch | 
| http://dev.dotclear.org/2.0/ticket/2214 | Mitigation Vendor Advisory | 
| http://www.securityfocus.com/bid/94246 | Third Party Advisory VDB Entry | 
| http://dev.dotclear.org/2.0/changeset/445e9ff79a1fa81033591761d6a340e219d159b2 | Issue Tracking Patch | 
| http://dev.dotclear.org/2.0/ticket/2214 | Mitigation Vendor Advisory | 
| http://www.securityfocus.com/bid/94246 | Third Party Advisory VDB Entry | 
Configurations
                    History
                    21 Nov 2024, 03:00
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://dev.dotclear.org/2.0/changeset/445e9ff79a1fa81033591761d6a340e219d159b2 - Issue Tracking, Patch | |
| References | () http://dev.dotclear.org/2.0/ticket/2214 - Mitigation, Vendor Advisory | |
| References | () http://www.securityfocus.com/bid/94246 - Third Party Advisory, VDB Entry | 
Information
                Published : 2016-11-10 20:59
Updated : 2025-04-12 10:46
NVD link : CVE-2016-9268
Mitre link : CVE-2016-9268
CVE.ORG link : CVE-2016-9268
JSON object : View
Products Affected
                dotclear
- dotclear
CWE
                
                    
                        
                        CWE-434
                        
            Unrestricted Upload of File with Dangerous Type
