Description
|
|
Multiple vulnerabilities were identified in Geeklog, which could be exploited by remote attackers to execute arbitrary commands.
The first issue is due to input validation errors in the "users.php" and "lib-sessions.php" scripts that do not properly validate the "userid" and "sessid" cookie parameters before being used in SQL statements, which could be exploited by malicious people to conduct SQL injection attacks.
The second flaw is due to an input validation error in the "lib-common.php" file that does not properly validate the "path_language" and "language" variables, which could be exploited in combination with the first issue to include local files (e.g. error.log) and execute arbitrary commands injected via SQL error messages.
|