Unrestricted file upload vulnerability in ecrire/images.php in Dotclear 1.2.7.1 and earlier allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in images.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:48
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/44441 - | |
References | () http://secunia.com/advisories/29819 - | |
References | () http://www.dotclear.net/blog/post/2008/04/18/Dotclear-128 - | |
References | () http://www.dotclear.net/blog/post/2008/04/18/Gestionnaire-de-media-et-types-de-fichiers - | |
References | () http://www.openwall.com/lists/oss-security/2008/07/14/2 - | |
References | () http://www.securityfocus.com/archive/1/490865/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/28787 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/41828 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/44039 - |
Information
Published : 2008-07-18 16:41
Updated : 2025-04-09 00:30
NVD link : CVE-2008-3232
Mitre link : CVE-2008-3232
CVE.ORG link : CVE-2008-3232
JSON object : View
Products Affected
dotclear
- dotclear
CWE