Description
|
|
Two vulnerabilities have been identified in Netious CMS, which could be exploited by remote attackers to execute arbitrary SQL commands or bypass security restrictions.
The first flaw is due to an input validation error in the "index.php" script that does not validate the "username" parameter before being used in SQL statements, which could be exploited by malicious people to conduct SQL injection attacks.
The second issue is due to an error in the the session management procedure that relies on the user's IP address to handle sessions, which could be exploited by a malicious user to gain unauthorized administrative access to a vulnerable application.
|