Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:30864
HistoryJun 14, 2014 - 12:00 a.m.

[KIS-2014-05] Dotclear <= 2.6.2 (XML-RPC Interface) Authentication Bypass Vulnerability

2014-06-1400:00:00
vulners.com
24

Dotclear <= 2.6.2 (XML-RPC Interface) Authentication Bypass Vulnerability

[-] Software Link:

http://dotclear.org/

[-] Affected Versions:

Version 2.6.2 and probably prior versions.

[-] Vulnerability Description:

The vulnerable code is located in the dcXmlRpc::setUser() method
(inc/core/class.dc.xmlrpc.php):

  1.    /* Internal methods
    
  2.    --------------------------------------------------- */
    
  3.    private function setUser&#40;$user_id,$pwd&#41;
    
  4.    {
    
  5.    	if &#40;$this-&gt;core-&gt;auth-&gt;userID&#40;&#41; == $user_id&#41; {
    
  6.    		return true;
    
  7.    	}
    
  8.    	if &#40;$this-&gt;core-&gt;auth-&gt;checkUser&#40;$user_id,$pwd&#41; !== true&#41; {
    
  9.    		throw new Exception&#40;&#39;Login error&#39;&#41;;
    
  10.    	}
    
  11.    	return true;
    

The vulnerability exists because of the method not properly verifying
the provided password
before being used in a call to the dcAuth::checkUser() method at line
270. This could be exploited
to bypass the authentication mechanism by sending an XML-RPC request
with a valid username and an
empty password. Successful exploitation of this vulnerability requires
the XML-RPC interface to
be enabled (disabled by default).

[-] Solution:

Update to version 2.6.3.

[-] Disclosure Timeline:

[14/05/2014] - Vendor notified
[15/05/2014] - Vendor response
[16/05/2014] - Version 2.6.3 released:
http://dotclear.org/blog/post/2014/05/16/Dotclear-2.6.3
[16/05/2014] - CVE number requested
[19/05/2014] - CVE number assigned
[21/05/2014] - Public disclosure

[-] CVE Reference:

The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2014-3781 to this vulnerability.

[-] Credits:

Vulnerability discovered by Egidio Romano.

[-] Original Advisory:

http://karmainsecurity.com/KIS-2014-05