Morgan ARMAND has discovered a vulnerability in DotClear, which can be exploited by malicious users to compromise a vulnerable system.
The ecrire/images.php script fails to validate the extension of an uploaded file. This can be exploited to upload files with the ".php" extension and execute arbitrary PHP code on the server, by creating a file that is both a syntactically correct PHP script and an image that the PHP function getimagesize() considers correct.
Successful exploitation requires valid advanced editor or administrator credentials, and having set write permissions on the "images/" directory.
The vulnerability is confirmed in version 126.96.36.199. Other versions may also be affected.
Solution: Only grant advanced editor or administrator access to trusted users.
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to email@example.com