The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of Dotclear

computer vulnerability CVE-2018-16358

Dotclear: Cross Site Scripting via ahtml

Synthesis of the vulnerability

An attacker can trigger a Cross Site Scripting via ahtml of Dotclear, in order to run JavaScript code in the context of the web site.
Impacted products: Dotclear.
Severity: 2/4.
Consequences: client access/rights.
Provenance: document.
Creation date: 03/09/2018.
Identifiers: CVE-2018-16358, VIGILANCE-VUL-27135.

Description of the vulnerability

An attacker can trigger a Cross Site Scripting via ahtml of Dotclear, in order to run JavaScript code in the context of the web site.
Full Vigil@nce bulletin... (Free trial)

vulnerability note CVE-2018-5690

Dotclear: Cross Site Scripting via admin/users.php

Synthesis of the vulnerability

An attacker can trigger a Cross Site Scripting via admin/users.php of Dotclear, in order to run JavaScript code in the context of the web site.
Impacted products: Dotclear.
Severity: 2/4.
Consequences: client access/rights.
Provenance: document.
Creation date: 15/01/2018.
Identifiers: CVE-2018-5690, VIGILANCE-VUL-25054.

Description of the vulnerability

The Dotclear product offers a web service.

However, it does not filter received data via admin/users.php before inserting them in generated HTML documents.

An attacker can therefore trigger a Cross Site Scripting via admin/users.php of Dotclear, in order to run JavaScript code in the context of the web site.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2018-5689

Dotclear: Cross Site Scripting via admin/auth.php

Synthesis of the vulnerability

An attacker can trigger a Cross Site Scripting via admin/auth.php of Dotclear, in order to run JavaScript code in the context of the web site.
Impacted products: Dotclear.
Severity: 2/4.
Consequences: client access/rights.
Provenance: document.
Creation date: 15/01/2018.
Identifiers: CVE-2018-5689, VIGILANCE-VUL-25053.

Description of the vulnerability

The Dotclear product offers a web service.

However, it does not filter received data via admin/auth.php before inserting them in generated HTML documents.

An attacker can therefore trigger a Cross Site Scripting via admin/auth.php of Dotclear, in order to run JavaScript code in the context of the web site.
Full Vigil@nce bulletin... (Free trial)

vulnerability CVE-2017-6446

Dotclear: Cross Site Scripting via admin/blogs.php

Synthesis of the vulnerability

An attacker can trigger a Cross Site Scripting via admin/blogs.php of Dotclear, in order to run JavaScript code in the context of the web site.
Impacted products: Dotclear.
Severity: 2/4.
Consequences: client access/rights.
Provenance: document.
Creation date: 06/03/2017.
Identifiers: CVE-2017-6446, VIGILANCE-VUL-22020.

Description of the vulnerability

The Dotclear product offers a web service.

However, it does not filter received data via admin/blogs.php before inserting them in generated HTML documents.

An attacker can therefore trigger a Cross Site Scripting via admin/blogs.php of Dotclear, in order to run JavaScript code in the context of the web site.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability CVE-2016-9891

Dotclear: Cross Site Scripting via admin/media.php

Synthesis of the vulnerability

An attacker can trigger a Cross Site Scripting via admin/media.php of Dotclear, in order to run JavaScript code in the context of the web site.
Impacted products: Dotclear.
Severity: 2/4.
Consequences: client access/rights.
Provenance: document.
Creation date: 30/12/2016.
Identifiers: CVE-2016-9891, VIGILANCE-VUL-21485.

Description of the vulnerability

The Dotclear product offers a web service.

However, it does not filter received data via admin/media.php before inserting them in generated HTML documents.

An attacker can therefore trigger a Cross Site Scripting via admin/media.php of Dotclear, in order to run JavaScript code in the context of the web site.
Full Vigil@nce bulletin... (Free trial)

vulnerability alert CVE-2016-9268

Dotclear: file upload via blog_theme.php

Synthesis of the vulnerability

A privileged attacker can upload a malicious file via blog_theme.php on Dotclear, in order for example to upload a Trojan.
Impacted products: Dotclear.
Severity: 1/4.
Consequences: privileged access/rights, user access/rights.
Provenance: privileged account.
Creation date: 14/11/2016.
Identifiers: CVE-2016-9268, VIGILANCE-VUL-21111.

Description of the vulnerability

The Dotclear product offers a web service.

A super-administrator can upload a file via blog_theme.php. However, a PHP file can be uploaded on the server, and then executed.

A privileged attacker can therefore upload a malicious file via blog_theme.php on Dotclear, in order for example to upload a Trojan.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce CVE-2016-7902

Dotclear: file upload via fileUnzip

Synthesis of the vulnerability

An attacker can upload a malicious file via fileUnzip on Dotclear, in order for example to upload a Trojan.
Impacted products: Dotclear.
Severity: 3/4.
Consequences: privileged access/rights, user access/rights.
Provenance: internet client.
Creation date: 06/10/2016.
Identifiers: CVE-2016-7902, VIGILANCE-VUL-20777.

Description of the vulnerability

The Dotclear product offers a web service.

It can be used to upload a file. However, as the file type is not restricted, a PHP file can be uploaded on the server, and then executed.

An attacker can therefore upload a malicious file via fileUnzip on Dotclear, in order for example to upload a Trojan.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability alert CVE-2016-7903

Dotclear: spoofing of password reset page

Synthesis of the vulnerability

An attacker can define a malicious password reset page for Dotclear, in order to obtain a password entered by a victim.
Impacted products: Dotclear.
Severity: 2/4.
Consequences: data reading.
Provenance: document.
Creation date: 05/10/2016.
Identifiers: CVE-2016-7903, VIGILANCE-VUL-20776.

Description of the vulnerability

The admin/auth.php script of Dotclear generates the url of the password reset page.

However, this script uses the HTTP Host header, which can be changed on a server hosting several sites.

An attacker can therefore define a malicious password reset page for Dotclear, in order to obtain a password entered by a victim.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce 20467

Dotclear: vulnerability via Blogroll Plugin

Synthesis of the vulnerability

A vulnerability via Blogroll Plugin of Dotclear was announced.
Impacted products: Dotclear.
Severity: 2/4.
Consequences: unknown consequence, administrator access/rights, privileged access/rights, user access/rights, client access/rights, data reading, data creation/edition, data deletion, data flow, denial of service on server, denial of service on service, denial of service on client, disguisement.
Provenance: internet client.
Creation date: 25/08/2016.
Identifiers: VIGILANCE-VUL-20467.

Description of the vulnerability

A vulnerability of Blogroll Plugin of Dotclear was announced.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability alert 20466

Dotclear: three vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Dotclear.
Impacted products: Dotclear.
Severity: 3/4.
Consequences: user access/rights, client access/rights, data reading.
Provenance: document.
Number of vulnerabilities in this bulletin: 3.
Creation date: 25/08/2016.
Identifiers: VIGILANCE-VUL-20466.

Description of the vulnerability

Several vulnerabilities were announced in Dotclear.

An attacker can traverse directories via media.php, in order to read a file outside the root path. [severity:2/4]

An attacker can upload a malicious file, in order for example to upload a Trojan. [severity:3/4]

An attacker can bypass security features via RSS Feed, in order to obtain sensitive information. [severity:2/4]
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about Dotclear: