Description
|
|
Multiple vulnerabilities were identified in eFiction, which could be exploited by remote attackers to execute arbitrary commands, or conduct cross site scripting and SQL injection attacks.
The first flaw is due to an input validation error in the "titles.php" script that does not properly validate the "let" parameter, which may be exploited by attackers to cause arbitrary scripting code to be executed by the user's browser.
The second issue is due to input validation errors in the "authors.php", "titles.php", "viewstory.php" and "viewuser.php" scripts that do not properly validate certain parameters, which may be exploited by malicious users to conduct SQL injection attacks and gain unauthorized access to the administration interface.
The third vulnerability is due to an error in the "Manage Images" feature that does not properly validate uploaded files, which could be exploited by attackers to upload malicious files and execute arbitrary PHP commands.
The fourth issue is due to an input validation error in the "storyblock.php" script when called directly via the browser, which may be exploited by attackers to determine the installation path.
|