CVE-2008-3232
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
18/07/2008
Last modified:
09/04/2025
Description
Unrestricted file upload vulnerability in ecrire/images.php in Dotclear 1.2.7.1 and earlier allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in images.
Impact
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:dotclear:dotclear:*:*:*:*:*:*:*:* | 1.2.7 (including) | |
| cpe:2.3:a:dotclear:dotclear:1.2.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:dotclear:dotclear:1.2.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:dotclear:dotclear:1.2.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:dotclear:dotclear:1.2.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:dotclear:dotclear:1.2.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:dotclear:dotclear:1.2.6:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://osvdb.org/44441
- http://secunia.com/advisories/29819
- http://www.dotclear.net/blog/post/2008/04/18/Dotclear-128
- http://www.dotclear.net/blog/post/2008/04/18/Gestionnaire-de-media-et-types-de-fichiers
- http://www.openwall.com/lists/oss-security/2008/07/14/2
- http://www.securityfocus.com/archive/1/490865/100/0/threaded
- http://www.securityfocus.com/bid/28787
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41828
- https://exchange.xforce.ibmcloud.com/vulnerabilities/44039
- http://osvdb.org/44441
- http://secunia.com/advisories/29819
- http://www.dotclear.net/blog/post/2008/04/18/Dotclear-128
- http://www.dotclear.net/blog/post/2008/04/18/Gestionnaire-de-media-et-types-de-fichiers
- http://www.openwall.com/lists/oss-security/2008/07/14/2
- http://www.securityfocus.com/archive/1/490865/100/0/threaded
- http://www.securityfocus.com/bid/28787
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41828
- https://exchange.xforce.ibmcloud.com/vulnerabilities/44039



