Unrestricted file upload vulnerability in the fileUnzip->unzip method in Dotclear before 2.10.3 allows remote authenticated users with permissions to manage media items to execute arbitrary code by uploading a ZIP file containing a file with a crafted extension, as demonstrated by .php.txt or .php%20.
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2016/10/05/6 | mailing list |
https://dotclear.org/blog/post/2016/11/01/Dotclear-2.10.3 | patch vendor advisory |
https://hg.dotclear.org/dotclear/rev/a9db771a5a70 | patch |
http://www.securityfocus.com/bid/93440 | vdb entry |