CVE-2014-1613

EUVD-2014-1688
Dotclear before 2.6.2 allows remote attackers to execute arbitrary PHP code via a serialized object in the dc_passwd cookie to a password-protected page, which is not properly handled by (1) inc/public/lib.urlhandlers.php or (2) plugins/pages/_public.php.
Code Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
Base Score
CVSS 3.x
EPSS Score
Percentile: 68%
Affected Products (NVD)
VendorProductVersion
dotcleardotclear
𝑥
≤ 2.6.1
dotcleardotclear
2.0
dotcleardotclear
2.0:beta_2
dotcleardotclear
2.0:beta_3
dotcleardotclear
2.0:beta_4
dotcleardotclear
2.0:beta_5.2
dotcleardotclear
2.0:beta_5.4
dotcleardotclear
2.0:beta_6
dotcleardotclear
2.0:beta_7
dotcleardotclear
2.0:rc1
dotcleardotclear
2.0:rc2
dotcleardotclear
2.0.1
dotcleardotclear
2.0.2
dotcleardotclear
2.1
dotcleardotclear
2.1.1
dotcleardotclear
2.1.3
dotcleardotclear
2.1.4
dotcleardotclear
2.1.5
dotcleardotclear
2.1.6
dotcleardotclear
2.1.7
dotcleardotclear
2.2
dotcleardotclear
2.2.1
dotcleardotclear
2.2.2
dotcleardotclear
2.2.3
dotcleardotclear
2.3.0
dotcleardotclear
2.3.1
dotcleardotclear
2.4.2
dotcleardotclear
2.4.3
dotcleardotclear
2.4.4
dotcleardotclear
2.5.0
dotcleardotclear
2.5.1
dotcleardotclear
2.5.2
dotcleardotclear
2.5.3
dotcleardotclear
2.6
dotcleardotclear
2.6:rc
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
dotclear
lucid
dne
precise
ignored
saucy
ignored
trusty
dne
utopic
not-affected
vivid
not-affected
wily
not-affected
xenial
not-affected
yakkety
dne
zesty
dne