Permissions, Privileges, and Access Controls in Dotclear - CVE-2011-1584
Published: June 8, 2011 / Updated: August 11, 2020
Dotclear
Detailed vulnerability description
The vulnerability allows a remote #AU# to read and manipulate data.
The updateFile function in inc/core/class.dc.media.php in the Media Manager in Dotclear before 2.2.3 does not properly restrict pathnames, which allows remote authenticated users to upload and execute arbitrary PHP code via the media_path or media_file parameter. NOTE: some of these details are obtained from third party information.
How to mitigate CVE-2011-1584
Sources
- http://dev.dotclear.org/2.0/changeset/2:3427
- http://dotclear.org/blog/post/2011/04/01/Dotclear-2.2.3
- http://fr.dotclear.org/blog/post/2011/04/01/Dotclear-2.2.3
- http://openwall.com/lists/oss-security/2011/04/13/19
- http://openwall.com/lists/oss-security/2011/04/14/8
- http://openwall.com/lists/oss-security/2011/04/15/11
- http://openwall.com/lists/oss-security/2011/04/15/7
- http://secunia.com/advisories/44049
- http://www.arcabit.com/english/home/a-flaw-in-dotclear