Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:19662
HistoryApr 15, 2008 - 12:00 a.m.

Dotclear 'ecrire/images.php' Arbitrary File Upload Vulnerability

2008-04-1500:00:00
vulners.com
82

#####################################################################

Advisory #1 "Dotclear 'ecrire/images.php' Arbitrary File Upload
Vulnerability"

$ Author : Morgan ARMAND
$ Contact : armand_m at epitech dot net
$ Vendor URL : http://www.dotclear.net
$ Vendor Contacted : 07/04/2008
$ Vendor Status : No response
$ Affected Software : Dotclear <= 1.2.7.1
$ Severity : Medium / Critical

#####################################################################

Vulnerability:

Dotclear is prone to an arbitrary script upload vulnerability.

The vulnerability is caused due to missing validation of the file extension.

If successfully exploited, an attacker can execute arbitrary script code
on a vulnerable server.
You need to have an account in order to access to the vulnerable page.

All versions of Dotclear are considered vulnerable at the moment.