|
Description
|
|
Multiple vulnerabilities have been identified in phpwcms, which could be exploited by remote attackers to execute arbitrary commands or scripting code.
The first issue is due to input validation errors in various scripts when processing the "BL[be_cnt_plainhtml]" parameter, which could be exploited by attackers to cause malicious scripting code to be executed by the user's browser.
The second flaw is due to an input validation error in the "include/inc_ext/spaw/spaw_control.class.php" script that does not properly validate the "spaw_root" parameter, which could be exploited by malicious users to include local files (e.g. uploaded images) and execute arbitrary commands with the privileges of the web server.
Note : Various scripts do not properly handle empty or invalid parameters, which could be exploited by attackers to determine the installation path.
|