Description
|
|
Multiple vulnerabilities have been identified in Pixelpost, which could be exploited by remote attackers to execute arbitrary commands or scripting code.
The first flaw is due to an input validation error in the "index.php" script that does not properly validate the "showimage" variable before being used in SQL statements, which could be exploited by malicious people to conduct SQL injection attacks and gain unauthorized access to the administration interface where they can upload malicious scripts and execute arbitrary commands with the privileges of the web server.
The second flaw is due to errors in the "includes/functions.php" file that does not validate the "HTTP_USER_AGENT", "HTTP_REFERER" and "HTTP_HOST" headers before being used in SQL statements, which could be exploited by malicious people to conduct SQL injection attacks.
The third vulnerability is due to an input validation error in the "clean()" [includes/functions.php] function that does not properly sanitise certain HTML tags included in comments, which could be exploited by attackers to cause arbitrary scripting code to be executed by the user's browser when a malicious comment is viewed.
Note : Attackers can obtain system information returned by the "phpinfo()" function by accessing the "includes/phpinfo.php" script, which could aid them in further attacks.
|