Description
|
|
Two vulnerabilities were identified in eyeOS, which may be exploited by attackers to inject malicious HTML code or gain knowledge of sensitive information.
The first flaw is due to an input validation error in the "desktop.php" script that does not properly filter a specially crafted "motd" parameter, which may be exploited by attackers to cause arbitrary scripting code to be executed by the user's browser.
The second issue is due to a design error where the file "usrinfo.xml" (containing usernames and passwords) is publicly accessible.
|