Dotclear before 2.6.2 allows remote attackers to execute arbitrary PHP code via a serialized object in the dc_passwd cookie to a password-protected page, which is not properly handled by (1) inc/public/lib.urlhandlers.php or (2) plugins/pages/_public.php.
References
Link | Resource |
---|---|
http://dotclear.org/blog/post/2014/01/20/Dotclear-2.6.2 | Patch Vendor Advisory |
https://labs.mwrinfosecurity.com/advisories/2014/05/14/dotclear-php-object-injection/ | Exploit |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2014-05-16T15:00:00
Updated: 2014-05-16T14:57:00
Reserved: 2014-01-20T00:00:00
Link: CVE-2014-1613
JSON object: View
NVD Information
Status : Analyzed
Published: 2014-05-16T15:55:04.927
Modified: 2014-05-16T18:43:47.073
Link: CVE-2014-1613
JSON object: View
Redhat Information
No data.
CWE