openWYSIWYG Folder Listing and Image Upload Vulnerabilities
Description
Two vulnerabilities have been identified in openWYSIWYG, which could be exploited by attackers to bypass security restrictions and gain knowledge of sensitive information.
The first issue is caused by an input validation error in the "addons/imagelibrary/select_image.php" script when processing the "dir" parameter, which could allow attackers to list the contents of arbitrary folders.
The second weakness is caused by an error in the "openwysiwyg/addons/imagelibrary/insert_image.php" script when processing uploaded images, which could allow attackers to upload arbitrary image files.
Vulnerable Products
Vulnerable Software: openWYSIWYG version 1.4.7 and prior