Unrestricted file upload vulnerability in the fileUnzip->unzip method in Dotclear before 2.10.3 allows remote authenticated users with permissions to manage media items to execute arbitrary code by uploading a ZIP file containing a file with a crafted extension, as demonstrated by .php.txt or .php%20.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2016/10/05/6 | Mailing List |
http://www.securityfocus.com/bid/93440 | |
https://dotclear.org/blog/post/2016/11/01/Dotclear-2.10.3 | Patch Vendor Advisory |
https://hg.dotclear.org/dotclear/rev/a9db771a5a70 | Patch |
http://www.openwall.com/lists/oss-security/2016/10/05/6 | Mailing List |
http://www.securityfocus.com/bid/93440 | |
https://dotclear.org/blog/post/2016/11/01/Dotclear-2.10.3 | Patch Vendor Advisory |
https://hg.dotclear.org/dotclear/rev/a9db771a5a70 | Patch |
Configurations
History
21 Nov 2024, 02:58
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2016/10/05/6 - Mailing List | |
References | () http://www.securityfocus.com/bid/93440 - | |
References | () https://dotclear.org/blog/post/2016/11/01/Dotclear-2.10.3 - Patch, Vendor Advisory | |
References | () https://hg.dotclear.org/dotclear/rev/a9db771a5a70 - Patch |
Information
Published : 2017-01-04 21:59
Updated : 2024-11-21 02:58
NVD link : CVE-2016-7902
Mitre link : CVE-2016-7902
CVE.ORG link : CVE-2016-7902
JSON object : View
Products Affected
dotclear
- dotclear
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type