Dotclear 'ecrire/images.php' Arbitrary File Upload Vulnerability

Type securityvulns
Reporter Securityvulns
Modified 2008-04-15T00:00:00


Advisory #1 "Dotclear 'ecrire/images.php' Arbitrary File Upload Vulnerability"

$ Author : Morgan ARMAND $ Contact : armand_m at epitech dot net $ Vendor URL : $ Vendor Contacted : 07/04/2008 $ Vendor Status : No response $ Affected Software : Dotclear <= $ Severity : Medium / Critical


Dotclear is prone to an arbitrary script upload vulnerability.

The vulnerability is caused due to missing validation of the file extension.

If successfully exploited, an attacker can execute arbitrary script code on a vulnerable server. You need to have an account in order to access to the vulnerable page.

All versions of Dotclear are considered vulnerable at the moment.