CVE-2016-7902

Published on: 01/04/2017 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:06 PM UTC

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Certain versions of Dotclear from Dotclear contain the following vulnerability:

Unrestricted file upload vulnerability in the fileUnzip->unzip method in Dotclear before 2.10.3 allows remote authenticated users with permissions to manage media items to execute arbitrary code by uploading a ZIP file containing a file with a crafted extension, as demonstrated by .php.txt or .php%20.

  • CVE-2016-7902 has been assigned by [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 8.8 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW LOW NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 6.5 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK LOW SINGLE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL PARTIAL PARTIAL

CVE References

Description Tags Link
Dotclear 2.10.3 › Dotclear News › Dotclear › Blog management made easy Patch
Vendor Advisory
dotclear.org
text/html
URL Logo CONFIRM dotclear.org/blog/post/2016/11/01/Dotclear-2.10.3
oss-security - CVE-2016-7902: Dotclear <= 2.10.2 (Media Manager) Unrestricted File Upload Mailing List
www.openwall.com
text/html
URL Logo MLIST [oss-security] 20161005 CVE-2016-7902: Dotclear <= 2.10.2 (Media Manager) Unrestricted File Upload
Dotclear CVE-2016-7902 Arbitrary File Upload Vulnerability cve.report (archive)
text/html
URL Logo BID 93440
Dotclear: changeset 3354:a9db771a5a70 Patch
web.archive.org
text/html
Inactive LinkNot Archived
URL Logo CONFIRM hg.dotclear.org/dotclear/rev/a9db771a5a70

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationDotclearDotclearAllAllAllAll
  • cpe:2.3:a:dotclear:dotclear:*:*:*:*:*:*:*:*: