Multiple incomplete blacklist vulnerabilities in inc/core/class.dc.core.php in Dotclear before 2.8.2 allow remote authenticated users with "manage their own media items" and "manage their own entries and comments" permissions to execute arbitrary PHP code by uploading a file with a (1) .pht, (2) .phps, or (3) .phtml extension.
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Link | Tags |
---|---|
https://hg.dotclear.org/dotclear/rev/198580bc3d80 | patch vendor advisory issue tracking |
http://www.openwall.com/lists/oss-security/2016/03/07/5 | patch mailing list third party advisory |
http://www.openwall.com/lists/oss-security/2016/03/05/4 | patch mailing list third party advisory |
http://dotclear.org/blog/post/2015/10/25/Dotclear-2.8.2 | release notes vendor advisory |
http://www.securityfocus.com/bid/96379 | vdb entry |
http://seclists.org/fulldisclosure/2015/Nov/58 | patch mailing list exploit third party advisory |
https://blog.curesec.com/article/blog/dotclear-281-Code-Execution-93.html | patch third party advisory exploit |
http://packetstormsecurity.com/files/134352/dotclear-2.8.1-Shell-Upload.html | patch third party advisory exploit |