CVE-2016-7902

Unrestricted file upload vulnerability in the fileUnzip->unzip method in Dotclear before 2.10.3 allows remote authenticated users with permissions to manage media items to execute arbitrary code by uploading a ZIP file containing a file with a crafted extension, as demonstrated by .php.txt or .php%20.
Configurations

Configuration 1 (hide)

cpe:2.3:a:dotclear:dotclear:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:58

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2016/10/05/6 - Mailing List () http://www.openwall.com/lists/oss-security/2016/10/05/6 - Mailing List
References () http://www.securityfocus.com/bid/93440 - () http://www.securityfocus.com/bid/93440 -
References () https://dotclear.org/blog/post/2016/11/01/Dotclear-2.10.3 - Patch, Vendor Advisory () https://dotclear.org/blog/post/2016/11/01/Dotclear-2.10.3 - Patch, Vendor Advisory
References () https://hg.dotclear.org/dotclear/rev/a9db771a5a70 - Patch () https://hg.dotclear.org/dotclear/rev/a9db771a5a70 - Patch

Information

Published : 2017-01-04 21:59

Updated : 2024-11-21 02:58


NVD link : CVE-2016-7902

Mitre link : CVE-2016-7902

CVE.ORG link : CVE-2016-7902


JSON object : View

Products Affected

dotclear

  • dotclear
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type