Description
|
|
Multiple vulnerabilities were identified in Tellme, which could be exploited by malicious users to bypass certain security restrictions or conduct cross site scripting attacks.
The first flaw is due to an input validation error in "index.php" when processing a specially crafted "q_IP" or "q_Host" parameter, which may be exploited by attackers to cause arbitrary scripting code to be executed by the user's browser.
The second issue is due to an input validation error in "index.php" when processing a specially crafted "q_Host" parameter, which may be exploited by remote attackers to pass arbitrary parameters to the "whois" command.
The third vulnerability is due to an error in the "o_Server" and "o_Head" modules when handling a specially crafted "q_host", which could be exploited by attackers to determine the installation path.
|