|
Description
|
|
Multiple vulnerabilities have been identified in Falcon Series One, which could be exploited by remote attackers to execute arbitrary commands or scripting code.
The first issue is caused by input validation errors in the "index.php" script when processing the "gb_mail", "gb_name", and "gb_text" parameters, which could be exploited by attackers to cause malicious scripting code to be executed by the user's browser.
The second vulnerability is caused by input validation errors in the "sitemap.xml.php" and "errors.php" scripts when processing the "dir[classes]" and "error" parameters, which could be exploited by attackers to include malicious scripts and execute arbitrary commands with the privileges of the web server.
The third issue is caused by a design error in the "index.php" script when processing user-supplied data, which could be exploited to conduct cross-site request forgery attacks (e.g. trick the administrator into changing a password).
|