Description
|
|
Multiple vulnerabilities have been identified in PHP-Post, which could be exploited by remote attackers to gain knowledge of sensitive information or execute arbitrary SQL commands and scripting code.
The first flaw is due to input validation errors in various scripts (e.g. "index.php" and "profile.php") when processing the "user" and "table_prefix" parameters, which could be exploited by malicious people to conduct SQL injection attacks.
The second flaw is due to input validation errors in various scripts (e.g. "template.php" and "dropdown.php") when processing certain parameters (e.g. "txt_error" or "txt_login"), which could be exploited by attackers to cause arbitrary scripting code to be executed by the user's browser in the security context of an affected Web site.
The third issue is due to an input validation error in the "footer.php" script that does not validate the "template" parameter, which could be exploited by remote attackers to include or disclose the contents of arbitrary files with the privileges of the web server.
|