Vulnerability Description
Unrestricted file upload vulnerability in inc/swf/swfupload.swf in Dotclear 2.3.1 and 2.4.2 allows remote attackers to execute arbitrary code by uploading a file with an executable PHP extension, then accessing it via a direct request to the file in an unspecified directory.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dotclear | Dotclear | 2.3.1 |
Related Weaknesses (CWE)
References
- http://cxsecurity.com/issue/WLB-2011090012Exploit
- http://vigilance.fr/vulnerability/Dotclear-file-upload-via-swfupload-swf-11396Exploit
- http://www.exploit-db.com/exploits/18529
- http://www.osvdb.org/79665
- http://www.securityfocus.com/bid/52173
- http://cxsecurity.com/issue/WLB-2011090012Exploit
- http://vigilance.fr/vulnerability/Dotclear-file-upload-via-swfupload-swf-11396Exploit
- http://www.exploit-db.com/exploits/18529
- http://www.osvdb.org/79665
- http://www.securityfocus.com/bid/52173
FAQ
What is CVE-2011-5083?
CVE-2011-5083 is a vulnerability with a CVSS score of 7.5 (HIGH). Unrestricted file upload vulnerability in inc/swf/swfupload.swf in Dotclear 2.3.1 and 2.4.2 allows remote attackers to execute arbitrary code by uploading a file with an executable PHP extension, then...
How severe is CVE-2011-5083?
CVE-2011-5083 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-5083?
Check the references section above for vendor advisories and patch information. Affected products include: Dotclear Dotclear.