Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-8832

Опубликовано: 09 фев. 2017
Источник: debian
EPSS Низкий

Описание

Multiple incomplete blacklist vulnerabilities in inc/core/class.dc.core.php in Dotclear before 2.8.2 allow remote authenticated users with "manage their own media items" and "manage their own entries and comments" permissions to execute arbitrary PHP code by uploading a file with a (1) .pht, (2) .phps, or (3) .phtml extension.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
dotclearremovedpackage

Примечания

  • https://hg.dotclear.org/dotclear/rev/198580bc3d80

  • https://dotclear.org/blog/post/2015/10/25/Dotclear-2.8.2

  • Fixed upstream in 2.8.2

  • https://www.openwall.com/lists/oss-security/2016/03/05/4

EPSS

Процентиль: 78%
0.01118
Низкий

Связанные уязвимости

CVSS3: 8.8
ubuntu
почти 9 лет назад

Multiple incomplete blacklist vulnerabilities in inc/core/class.dc.core.php in Dotclear before 2.8.2 allow remote authenticated users with "manage their own media items" and "manage their own entries and comments" permissions to execute arbitrary PHP code by uploading a file with a (1) .pht, (2) .phps, or (3) .phtml extension.

CVSS3: 8.8
nvd
почти 9 лет назад

Multiple incomplete blacklist vulnerabilities in inc/core/class.dc.core.php in Dotclear before 2.8.2 allow remote authenticated users with "manage their own media items" and "manage their own entries and comments" permissions to execute arbitrary PHP code by uploading a file with a (1) .pht, (2) .phps, or (3) .phtml extension.

CVSS3: 8.8
github
больше 3 лет назад

Multiple incomplete blacklist vulnerabilities in inc/core/class.dc.core.php in Dotclear before 2.8.2 allow remote authenticated users with "manage their own media items" and "manage their own entries and comments" permissions to execute arbitrary PHP code by uploading a file with a (1) .pht, (2) .phps, or (3) .phtml extension.

EPSS

Процентиль: 78%
0.01118
Низкий