Description
|
|
A weakness and a vulnerability have been discovered in Nconf, which can be exploited by malicious people to disclose certain system information and conduct cross-site scripting attacks.
1) The weakness is caused due to the application displaying the full installation path in an error message from call_file.php when e.g. the "ajax_file" GET parameter is set to "service_list.php", "debug" GET parameter is set to "yes", "host_id" POST parameter is set to "1", "highlight_service" POST parameter is set to "1", and "class" POST parameter is set to "a".
2) Input passed via the "item" parameter to handle_item.php is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
The weakness and the vulnerability are confirmed in version 1.3.0. Other versions may also be affected.
|