The dcXmlRpc::setUser method in nc/core/class.dc.xmlrpc.php in Dotclear before 2.6.3 allows remote attackers to bypass authentication via an empty password in an XML-RPC request.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
http://dotclear.org/blog/post/2014/05/16/Dotclear-2.6.3 | vendor advisory |
http://seclists.org/fulldisclosure/2014/May/107 | exploit mailing list |
http://secunia.com/advisories/58675 | third party advisory |
http://packetstormsecurity.com/files/126766/Dotclear-2.6.2-Authentication-Bypass.html | exploit |
http://karmainsecurity.com/KIS-2014-05 | exploit |