Vulnerability Description
Unrestricted file upload vulnerability in the fileUnzip->unzip method in Dotclear before 2.10.3 allows remote authenticated users with permissions to manage media items to execute arbitrary code by uploading a ZIP file containing a file with a crafted extension, as demonstrated by .php.txt or .php%20.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dotclear | Dotclear | <= 2.10.2 |
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2016/10/05/6Mailing List
- http://www.securityfocus.com/bid/93440
- https://dotclear.org/blog/post/2016/11/01/Dotclear-2.10.3PatchVendor Advisory
- https://hg.dotclear.org/dotclear/rev/a9db771a5a70Patch
- http://www.openwall.com/lists/oss-security/2016/10/05/6Mailing List
- http://www.securityfocus.com/bid/93440
- https://dotclear.org/blog/post/2016/11/01/Dotclear-2.10.3PatchVendor Advisory
- https://hg.dotclear.org/dotclear/rev/a9db771a5a70Patch
FAQ
What is CVE-2016-7902?
CVE-2016-7902 is a vulnerability with a CVSS score of 8.8 (HIGH). Unrestricted file upload vulnerability in the fileUnzip->unzip method in Dotclear before 2.10.3 allows remote authenticated users with permissions to manage media items to execute arbitrary code by up...
How severe is CVE-2016-7902?
CVE-2016-7902 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-7902?
Check the references section above for vendor advisories and patch information. Affected products include: Dotclear Dotclear.