Description
Multiple cross-site scripting (XSS) vulnerabilities in Dotclear before 2.4.2 allow remote attackers to inject arbitrary web script or HTML via the (1) login_data parameter to admin/auth.php; (2) nb parameter to admin/blogs.php; (3) type, (4) sortby, (5) order, or (6) status parameters to admin/comments.php; or (7) page parameter to admin/plugin.php.
Exploits (4)
exploitdb
WORKING POC
VERIFIED
by High-Tech Bridge SA · textwebappsphp
https://www.exploit-db.com/exploits/36891
exploitdb
WORKING POC
VERIFIED
by High-Tech Bridge SA · textwebappsphp
https://www.exploit-db.com/exploits/36890
exploitdb
WORKING POC
VERIFIED
by High-Tech Bridge SA · textwebappsphp
https://www.exploit-db.com/exploits/36889
exploitdb
WORKING POC
VERIFIED
by High-Tech Bridge SA · htmlwebappsphp
https://www.exploit-db.com/exploits/36888
References (6)
Core 6
Core References
Exploit x_refsource_misc
https://www.htbridge.ch/advisory/HTB23074
Patch, Vendor Advisory x_refsource_confirm
http://dotclear.org/blog/post/2012/02/11/Dotclear-2.4.2
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/73565
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/52221
Third Party Advisory mailing-list
x_refsource_bugtraq
http://archives.neohapsis.com/archives/bugtraq/2012-02/0183.html
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/48209
Scores
EPSS
0.0261
EPSS Percentile
85.8%
Details
CWE
CWE-79
Status
published
Products (24)
dotclear/dotclear
1.2.1
dotclear/dotclear
1.2.2
dotclear/dotclear
1.2.3
dotclear/dotclear
1.2.4
dotclear/dotclear
1.2.5
dotclear/dotclear
1.2.6
dotclear/dotclear
1.2.7
dotclear/dotclear
1.2.8
dotclear/dotclear
2.0 (10 CPE variants)
dotclear/dotclear
2.0.1
... and 14 more
Published
Mar 19, 2012
Tracked Since
Feb 18, 2026