Dotclear versions 1.2.7.1 and below suffer from an arbitrary upload vulnerability in ecrire/images.php.
f00d2092dada1786af869794b935151e110c92321d1cc5e74cd53b92245b27ed
#####################################################################
Advisory #1 "Dotclear 'ecrire/images.php' Arbitrary File Upload
Vulnerability"
$ Author : Morgan ARMAND
$ Contact : armand_m at epitech dot net
$ Vendor URL : http://www.dotclear.net
$ Vendor Contacted : 07/04/2008
$ Vendor Status : No response
$ Affected Software : Dotclear <= 1.2.7.1
$ Severity : Medium / Critical
#####################################################################
Vulnerability:
Dotclear is prone to an arbitrary script upload vulnerability.
The vulnerability is caused due to missing validation of the file extension.
If successfully exploited, an attacker can execute arbitrary script code
on a vulnerable server.
You need to have an account in order to access to the vulnerable page.
All versions of Dotclear are considered vulnerable at the moment.