The updateFile function in inc/core/class.dc.media.php in the Media Manager in Dotclear before 2.2.3 does not properly restrict pathnames, which allows remote authenticated users to upload and execute arbitrary PHP code via the media_path or media_file parameter. NOTE: some of these details are obtained from third party information.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://openwall.com/lists/oss-security/2011/04/13/19 | mailing list |
http://openwall.com/lists/oss-security/2011/04/15/7 | mailing list |
http://openwall.com/lists/oss-security/2011/04/15/11 | mailing list |
http://fr.dotclear.org/blog/post/2011/04/01/Dotclear-2.2.3 | vendor advisory |
http://dotclear.org/blog/post/2011/04/01/Dotclear-2.2.3 | patch vendor advisory |
http://www.arcabit.com/english/home/a-flaw-in-dotclear | |
http://dev.dotclear.org/2.0/changeset/2:3427 | patch exploit |
http://secunia.com/advisories/44049 | third party advisory vendor advisory |
http://openwall.com/lists/oss-security/2011/04/14/8 | mailing list |