Unrestricted file upload vulnerability in the Blog appearance in the "Install or upgrade manually" module in Dotclear through 2.10.4 allows remote authenticated super-administrators to execute arbitrary code by uploading a theme file with an zip extension, and then accessing it via unspecified vectors.
References
Link | Resource |
---|---|
http://dev.dotclear.org/2.0/changeset/445e9ff79a1fa81033591761d6a340e219d159b2 | Issue Tracking Patch |
http://dev.dotclear.org/2.0/ticket/2214 | Mitigation Vendor Advisory |
http://www.securityfocus.com/bid/94246 | Third Party Advisory VDB Entry |
http://dev.dotclear.org/2.0/changeset/445e9ff79a1fa81033591761d6a340e219d159b2 | Issue Tracking Patch |
http://dev.dotclear.org/2.0/ticket/2214 | Mitigation Vendor Advisory |
http://www.securityfocus.com/bid/94246 | Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 03:00
Type | Values Removed | Values Added |
---|---|---|
References | () http://dev.dotclear.org/2.0/changeset/445e9ff79a1fa81033591761d6a340e219d159b2 - Issue Tracking, Patch | |
References | () http://dev.dotclear.org/2.0/ticket/2214 - Mitigation, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/94246 - Third Party Advisory, VDB Entry |
Information
Published : 2016-11-10 20:59
Updated : 2024-11-21 03:00
NVD link : CVE-2016-9268
Mitre link : CVE-2016-9268
CVE.ORG link : CVE-2016-9268
JSON object : View
Products Affected
dotclear
- dotclear
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type