Vulnerability CVE-2014-3781


Published: 2014-06-11

Description:
The dcXmlRpc::setUser method in nc/core/class.dc.xmlrpc.php in Dotclear before 2.6.3 allows remote attackers to bypass authentication via an empty password in an XML-RPC request.

See advisories in our WLB2 database:
Topic
Author
Date
High
Dotclear <= 2.6.2 (XML-RPC Interface) Authentication Bypass
Egidio Romano.
22.05.2014

Type:

CWE-287

(Improper Authentication)

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5.8/10
4.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
None
Affected software
Dotclear -> Dotclear 

 References:
http://secunia.com/advisories/58675
http://seclists.org/fulldisclosure/2014/May/107
http://packetstormsecurity.com/files/126766/Dotclear-2.6.2-Authentication-Bypass.html
http://karmainsecurity.com/KIS-2014-05
http://dotclear.org/blog/post/2014/05/16/Dotclear-2.6.3

Copyright 2024, cxsecurity.com

 

Back to Top