Description
|
|
Multiple vulnerabilities have been identified in VerliAdmin, which could be exploited by remote attackers execute arbitrary commands and scripting code.
The first issue is due to input validation errors in various scripts (e.g. "index.php") that do not validate certain parameters (e.g. "q"), which could be exploited by remote attackers to include malicious scripts and execute arbitrary commands with the privileges of the web server.
The second vulnerability is due to input validation errors in various scripts (e.g. "repass.php" or "verify.php") that do not validate user-supplied parameters (e.g. "nick_mod" or "nick") before being used in SQL statements, which could be exploited by malicious people to conduct SQL injection attacks.
The third flaw is due to input validation errors in various scripts that do not validate user-supplied parameters before being displayed, which could be exploited by attackers to cause arbitrary scripting code to be executed by the user's browser in the security context of an affected Web site.
|