CVE-2016-9268

Unrestricted file upload vulnerability in the Blog appearance in the "Install or upgrade manually" module in Dotclear through 2.10.4 allows remote authenticated super-administrators to execute arbitrary code by uploading a theme file with an zip extension, and then accessing it via unspecified vectors.
Configurations

Configuration 1 (hide)

cpe:2.3:a:dotclear:dotclear:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:00

Type Values Removed Values Added
References () http://dev.dotclear.org/2.0/changeset/445e9ff79a1fa81033591761d6a340e219d159b2 - Issue Tracking, Patch () http://dev.dotclear.org/2.0/changeset/445e9ff79a1fa81033591761d6a340e219d159b2 - Issue Tracking, Patch
References () http://dev.dotclear.org/2.0/ticket/2214 - Mitigation, Vendor Advisory () http://dev.dotclear.org/2.0/ticket/2214 - Mitigation, Vendor Advisory
References () http://www.securityfocus.com/bid/94246 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/94246 - Third Party Advisory, VDB Entry

Information

Published : 2016-11-10 20:59

Updated : 2024-11-21 03:00


NVD link : CVE-2016-9268

Mitre link : CVE-2016-9268

CVE.ORG link : CVE-2016-9268


JSON object : View

Products Affected

dotclear

  • dotclear
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type