|
Description
|
|
Multiple vulnerabilities have been identified in Else If CMS, which could be exploited by remote attackers to execute arbitrary commands or scripting code.
The first issue is caused by input validation errors in various scripts (e.g. "elseif/utilisateurs/vousetesbannis.php" or "elseif/moduleajouter/depot/adminforum.php") when processing user-supplied parameters, which could be exploited by attackers to cause malicious scripting code to be executed by the user's browser.
The second flaw is caused by input validation errors in various scripts (e.g. "elseif/contenus.php" or "elseif/utilisateurs/votes.php") when processing user-supplied parameters, which could be exploited by malicious users to include malicious scripts and execute arbitrary commands with the privileges of the web server.
The third vulnerability is caused by missing authentication in the "elseif/externe/swfupload/upload.php", which could be exploited by remote attackers to upload malicious scripts and execute PHP commands with the privileges of the web server.
The fourth issue is caused by input validation errors in the "elseif/utilisateurs/votesresultats.php" script, which could be exploited by attackers to disclose the installation path.
|