Dotclear before 2.6.2 allows remote attackers to execute arbitrary PHP code via a serialized object in the dc_passwd cookie to a password-protected page, which is not properly handled by (1) inc/public/lib.urlhandlers.php or (2) plugins/pages/_public.php.
References
Link | Resource |
---|---|
https://labs.mwrinfosecurity.com/advisories/2014/05/14/dotclear-php-object-injection/ | Exploit |
http://dotclear.org/blog/post/2014/01/20/Dotclear-2.6.2 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2014-05-16 08:55
Updated : 2014-05-16 11:43
NVD link : CVE-2014-1613
Mitre link : CVE-2014-1613
JSON object : View
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
Products Affected
dotclear
- dotclear