Description
|
|
Multiple vulnerabilities have been identified in Lurker, which could be exploited by attackers to bypass security restrictions, disclose sensitive information, and execute arbitrary scripting code.
The first flaw is due to an input validation error in the "lurker.cgi" script that does not properly validate certain parameters, which could be exploited by remote attackers to read arbitrary files.
The second issue is due to an unspecified error which can be exploited by attackers to create or overwrite arbitrary files in any writable directory called "mbox".
The third vulnerability is due to unspecified input validation errors when handling certain variables, which could be exploited by attackers to cause malicious scripting code to be executed by the user's browser in the security context of an affected Web site.
|