Description
SQL injection vulnerability in session.php in DotClear before 1.2.3 allows remote attackers to execute arbitrary SQL commands via the dc_xd parameter in a cookie.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Siegfried · textwebappsphp
https://www.exploit-db.com/exploits/26689
References (7)
Core 7
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/21333
Patch, Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/17830
Patch, Vendor Advisory x_refsource_misc
http://www.zone-h.org/advisories/read/id=8485
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2005/2677
Exploit, Patch vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/15667
Various Sources x_refsource_confirm
http://www.dotclear.net/forum/viewtopic.php?id=13876
Third Party Advisory mailing-list
x_refsource_fulldisc
http://archives.neohapsis.com/archives/fulldisclosure/2005-11/1052.html
Scores
EPSS
0.0092
EPSS Percentile
76.1%
Details
Status
published
Products (2)
dotclear/dotclear
1.2.1
dotclear/dotclear
1.2.2
Published
Dec 02, 2005
Tracked Since
Feb 18, 2026