Description
Unrestricted file upload vulnerability in the fileUnzip->unzip method in Dotclear before 2.10.3 allows remote authenticated users with permissions to manage media items to execute arbitrary code by uploading a ZIP file containing a file with a crafted extension, as demonstrated by .php.txt or .php%20.
References (4)
Core 4
Core References
Mailing List mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2016/10/05/6
Patch, Vendor Advisory x_refsource_confirm
https://dotclear.org/blog/post/2016/11/01/Dotclear-2.10.3
Patch x_refsource_confirm
https://hg.dotclear.org/dotclear/rev/a9db771a5a70
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/93440
Scores
CVSS v3
8.8
EPSS
0.0236
EPSS Percentile
85.0%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-434
Status
published
Products (1)
dotclear/dotclear
< 2.10.2
Published
Jan 04, 2017
Tracked Since
Feb 18, 2026