CVE-2014-3781
The dcXmlRpc::setUser method in nc/core/class.dc.xmlrpc.php in Dotclear before 2.6.3 allows remote attackers to bypass authentication via an empty password in an XML-RPC request.
View on NVDSeverity
N/A
EPSS
Probability of exploitation (next 30 days): 0.0045 (0.4%)
Percentile: 63.6%
EPSS: 2026-05-06
Affects
dotclear:dotclearTechnical description
The dcXmlRpc::setUser method in nc/core/class.dc.xmlrpc.php in Dotclear before 2.6.3 allows remote attackers to bypass authentication via an empty password in an XML-RPC request.
Published: 6/11/2014, 2:55:07 PM
Last modified: 5/6/2026, 10:30:45 PM
References
- http://dotclear.org/blog/post/2014/05/16/Dotclear-2.6.3
- http://karmainsecurity.com/KIS-2014-05
- http://packetstormsecurity.com/files/126766/Dotclear-2.6.2-Authentication-Bypass.html
- http://seclists.org/fulldisclosure/2014/May/107
- http://secunia.com/advisories/58675
- http://dotclear.org/blog/post/2014/05/16/Dotclear-2.6.3
- http://karmainsecurity.com/KIS-2014-05
- http://packetstormsecurity.com/files/126766/Dotclear-2.6.2-Authentication-Bypass.html