Description
|
|
Two vulnerabilities were identified in MySource, which could be exploited by remote attackers to execute arbitrary commands or conduct cross site scripting attacks.
The first flaw is due to input validation errors in various scripts when processing specially crafted "INCLUDE_PATH", "SQUIZLIB_PATH", and "PEAR_PATH" parameters, which may be exploited by remote attackers to include arbitrary files and execute arbitrary commands with the privileges of the web server.
The second issue is due to input validation errors in multiple scripts when handling specially crafted "target_url", "bgcolor", and "stylesheet" parameters, which may be exploited by attackers to cause arbitrary scripting code to be executed by the user's browser.
|