Vulnerability Description
The updateFile function in inc/core/class.dc.media.php in the Media Manager in Dotclear before 2.2.3 does not properly restrict pathnames, which allows remote authenticated users to upload and execute arbitrary PHP code via the media_path or media_file parameter. NOTE: some of these details are obtained from third party information.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dotclear | Dotclear | <= 2.2.2 |
Related Weaknesses (CWE)
References
- http://dev.dotclear.org/2.0/changeset/2:3427ExploitPatch
- http://dotclear.org/blog/post/2011/04/01/Dotclear-2.2.3PatchVendor Advisory
- http://fr.dotclear.org/blog/post/2011/04/01/Dotclear-2.2.3Vendor Advisory
- http://openwall.com/lists/oss-security/2011/04/13/19
- http://openwall.com/lists/oss-security/2011/04/14/8
- http://openwall.com/lists/oss-security/2011/04/15/11
- http://openwall.com/lists/oss-security/2011/04/15/7
- http://secunia.com/advisories/44049Vendor Advisory
- http://www.arcabit.com/english/home/a-flaw-in-dotclear
- http://dev.dotclear.org/2.0/changeset/2:3427ExploitPatch
- http://dotclear.org/blog/post/2011/04/01/Dotclear-2.2.3PatchVendor Advisory
- http://fr.dotclear.org/blog/post/2011/04/01/Dotclear-2.2.3Vendor Advisory
- http://openwall.com/lists/oss-security/2011/04/13/19
- http://openwall.com/lists/oss-security/2011/04/14/8
- http://openwall.com/lists/oss-security/2011/04/15/11
FAQ
What is CVE-2011-1584?
CVE-2011-1584 is a vulnerability with a CVSS score of 6.5 (MEDIUM). The updateFile function in inc/core/class.dc.media.php in the Media Manager in Dotclear before 2.2.3 does not properly restrict pathnames, which allows remote authenticated users to upload and execute...
How severe is CVE-2011-1584?
CVE-2011-1584 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-1584?
Check the references section above for vendor advisories and patch information. Affected products include: Dotclear Dotclear.