Описание
The dcXmlRpc::setUser method in nc/core/class.dc.xmlrpc.php in Dotclear before 2.6.3 allows remote attackers to bypass authentication via an empty password in an XML-RPC request.
Ссылки
- Vendor Advisory
- Exploit
- Exploit
- Exploit
- Vendor Advisory
- Exploit
- Exploit
- Exploit
Уязвимые конфигурации
Конфигурация 1Версия до 2.6.2 (включая)
Одно из
cpe:2.3:a:dotclear:dotclear:*:*:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.6:-:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.6:rc:*:*:*:*:*:*
cpe:2.3:a:dotclear:dotclear:2.6.1:*:*:*:*:*:*:*
EPSS
Процентиль: 63%
0.00447
Низкий
5.8 Medium
CVSS2
Дефекты
CWE-287
Связанные уязвимости
ubuntu
больше 11 лет назад
The dcXmlRpc::setUser method in nc/core/class.dc.xmlrpc.php in Dotclear before 2.6.3 allows remote attackers to bypass authentication via an empty password in an XML-RPC request.
debian
больше 11 лет назад
The dcXmlRpc::setUser method in nc/core/class.dc.xmlrpc.php in Dotclea ...
github
больше 3 лет назад
The dcXmlRpc::setUser method in nc/core/class.dc.xmlrpc.php in Dotclear before 2.6.3 allows remote attackers to bypass authentication via an empty password in an XML-RPC request.
EPSS
Процентиль: 63%
0.00447
Низкий
5.8 Medium
CVSS2
Дефекты
CWE-287