Vulnerability Description
The dcXmlRpc::setUser method in nc/core/class.dc.xmlrpc.php in Dotclear before 2.6.3 allows remote attackers to bypass authentication via an empty password in an XML-RPC request.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dotclear | Dotclear | <= 2.6.2 |
Related Weaknesses (CWE)
References
- http://dotclear.org/blog/post/2014/05/16/Dotclear-2.6.3Vendor Advisory
- http://karmainsecurity.com/KIS-2014-05Exploit
- http://packetstormsecurity.com/files/126766/Dotclear-2.6.2-Authentication-BypassExploit
- http://seclists.org/fulldisclosure/2014/May/107Exploit
- http://secunia.com/advisories/58675
- http://dotclear.org/blog/post/2014/05/16/Dotclear-2.6.3Vendor Advisory
- http://karmainsecurity.com/KIS-2014-05Exploit
- http://packetstormsecurity.com/files/126766/Dotclear-2.6.2-Authentication-BypassExploit
- http://seclists.org/fulldisclosure/2014/May/107Exploit
- http://secunia.com/advisories/58675
FAQ
What is CVE-2014-3781?
CVE-2014-3781 is a vulnerability with a CVSS score of 5.8 (MEDIUM). The dcXmlRpc::setUser method in nc/core/class.dc.xmlrpc.php in Dotclear before 2.6.3 allows remote attackers to bypass authentication via an empty password in an XML-RPC request.
How severe is CVE-2014-3781?
CVE-2014-3781 has been rated MEDIUM with a CVSS base score of 5.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-3781?
Check the references section above for vendor advisories and patch information. Affected products include: Dotclear Dotclear.