Description
|
|
Multiple vulnerabilities were identified in PHPlist, which could be exploited by malicious users to disclose sensitive information or conduct directory traversal, cross site scripting, and SQL injection attacks.
The first issue is due to input validation errors in the "admin/editlist.php" , "admin/spageedit.php", "admin/template.php", "admin/eventlog.php", "admin/configure.php", "admin/users.php", "admin/admin.php" and "admin/fckphplist.php" scripts when processing specially crafted "listname", "title", "filter", "delete", "start", "id", "find" and "action" parameters, which may be exploited by attackers to cause arbitrary scripting code to be executed by the user's browser.
The second flaw is due to input validation errors in the "admin/admin.php" and "admin/editattributes.php" scripts when processing a specially crafted "id" parameter, which may be exploited by malicious users to conduct SQL injection attacks.
The third vulnerability is due to an input validation error in "admin/attributes.php" and "admin/defaults.php" when processing a specially crafted "selected" variable, which may be exploited by attackers to disclose the contents of arbitrary files on the local disk.
Other bugs may be exploited by attackers to access users' personal date or to sign up to the PHPlist system without providing a password.
|